Vous êtes sur la page 1sur 5

CIS 409 Assignments and Rubrics

Assignment 2: Transnational Railways Due Week 7 and worth 100 points This assignment contains two (2) deliverables including a three (3) slide PowerPoint presentation, (3a), and a written paper. You must submit both deliverables for the completion of this assignment. Transnational Railways (TR) is a transportation company that operates a railroad system across the United States and Canada. Imagine you are one of several network administrators assigned to manage TRs network. TRs network is composed of a multi-domain forest. The root is named transnatrail.com with four (4) child domains named north.transnatrail.com, south.transnatrail.com, east.transnatrail.com, and west.transnatrail.com. Active Directory is configured for each domain. The forest root domain is named HQ_Site, and the remaining four (4) are named North_Site, South_Site, East_Site, and West_Site. Write a five to eight (5-8) page paper in which you analyze and solve the following issues: 1. TR has several Supervisory Conductors (SCs) stationed in different networked geographic regions who need access to a transport control module and other resources. The following info details placement of the SCs: Two (2) SCs have been placed in a global group in the forest root domain named SC_HQ_.

Three SCs are in global groups in each of the child domains. These groups are named SC_North, SC_South, SC_East, and SC_West. a. Propose a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while preventing them from accessing other resources in all the other domains besides their own. b. Explain why Microsofts AGUDLP approach is either advantageous or disadvantageous in this situation. 2. TR has gone on a hiring spree and needs to immediately create hundreds of new user accounts. The new employees will all be working at the companys headquarters in various departments. These employees must be added as quickly and efficiently as possible. a. Explain at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups. b. Explain why you would choose these tools for this situation. 3. TRs Network Administrator has tasked you with ensuring the security of the companys highly sensitive transportation infrastructure data. She knows that a secure network starts with ensuring the highest level of user account security. She has asked you to develop a plan to educate users on the importance of network security. a. Create a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporations broad range of employees using Microsoft PowerPoint or a similar presentation software tool. b. Explain how the approach you have taken to educate broad users will differ from the specialized education needed for higher-level security (i.e., securing the use of an administrative account). 4. You have been asked to create new Organizational Units (OU) for many of the newly hired employees. Many of these newly hired employees are expected to shift to different departments within the next few months. a. Describe two (2) benefits of creating OUs to represent different functional departments.
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 409 Student Version 1132 (1143 8-6-2012) Final Page 12 of 25

CIS 409 Assignments and Rubrics


b. Propose a way you can easily move users between OUs to help support the expected shift of employees to different departments. 5. You have created OUs to group users and computers by department. The Network Administrator has decided to use Group Policy Objects (GPOs) to help strengthen the security of the network. She has asked you to contribute to strengthening the networks security. She is especially concerned about user account security and event auditing. a. Choose and discuss two (2) domain-wide account policies that you believe would be effective to implement. b. Explain at least (2) implications to planning an auditing strategy. 6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are: Demonstrate the ability to describe, configure, and administer Active Directory services. Create security plans for use in the Active Directory environment. Demonstrate the ability to describe, configure, and administer Group Policy in the Active Directory environment. Create and configure User and Computer environments using Group Policy in the Active Directory environment. Use technology and information resources to research issues in directory service infrastructure environments. Write clearly and concisely about directory service infrastructure topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 100 Assignment 2: Transnational Railways Meets Minimum Expectations 60-69% D
Insufficiently proposed a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while

Criteria

Unacceptable Below 60% F


Did not submit or incompletely proposed a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ

Fair 70-79% C
Partially proposed a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while

Proficient 80-89% B
Satisfactorily proposed a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while

Exemplary 90-100% A
Thoroughly proposed a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while

1a. Propose a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while preventing them from accessing

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 409 Student Version 1132 (1143 8-6-2012) Final Page 13 of 25

CIS 409 Assignments and Rubrics


other resources in all the other domains besides their own. Weight: 15% domain while preventing them from accessing other resources in all the other domains besides their own. Did not submit or incompletely explained why Microsofts AGUDLP approach is either advantageous or disadvantageous in this situation. Did not submit or incompletely explained at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups. Did not submit or incompletely explained why you would choose these tools for this situation. Did not submit or incompletely created a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporations broad range of employees using Microsoft PowerPoint or a similar presentation software tool. Did not submit or incompletely explained how preventing them from accessing other resources in all the other domains besides their own. Insufficiently explained why Microsofts AGUDLP approach is either advantageous or disadvantageous in this situation. Insufficiently explained at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups. Insufficiently explained why you would choose these tools for this situation. Insufficiently created a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporations broad range of employees using Microsoft PowerPoint or a similar presentation software tool. Insufficiently explained how the approach preventing them from accessing other resources in all the other domains besides their own. Partially explained why Microsofts AGUDLP approach is either advantageous or disadvantageous in this situation. Partially explained at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups. Partially explained why you would choose these tools for this situation. Partially created a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporations broad range of employees using Microsoft PowerPoint or a similar presentation software tool. preventing them from accessing other resources in all the other domains besides their own. Satisfactorily explained why Microsofts AGUDLP approach is either advantageous or disadvantageous in this situation. Satisfactorily explained at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups. Satisfactorily explained why you would choose these tools for this situation. Satisfactorily created a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporations broad range of employees using Microsoft PowerPoint or a similar presentation software tool. Satisfactorily explained how the approach preventing them from accessing other resources in all the other domains besides their own. Thoroughly explained why Microsofts AGUDLP approach is either advantageous or disadvantageous in this situation. Thoroughly explained at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups. Thoroughly explained why you would choose these tools for this situation. Thoroughly created a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporations broad range of employees using Microsoft PowerPoint or a similar presentation software tool. Thoroughly explained how the approach

1b. Explain why Microsofts AGUDLP approach is either advantageous or disadvantageous in this situation. Weight: 5%

2a. Explain at least two (2) tools that Windows 2008 provides that can help you efficiently create multiple users and groups. Weight: 10%

2b. Explain why you would choose these tools for this situation. Weight: 5%

3a. Create a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporations broad range of employees using Microsoft PowerPoint or a similar presentation software tool. Weight: 15%

3b. Explain how the approach you have taken to

Partially explained how the approach

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 409 Student Version 1132 (1143 8-6-2012) Final Page 14 of 25

CIS 409 Assignments and Rubrics


educate broad users will differ from the specialized education needed for higher-level security (i.e., securing the use of an administrative account). Weight: 10% 4a. Describe two (2) benefits of creating OUs to represent different functional departments. Weight: 5% the approach you have taken to educate broad users will differ from the specialized education needed for higher-level security. Did not submit or incompletely described two (2) benefits of creating OUs to represent different functional departments. Did not submit or incompletely proposed a way you can easily move users between OUs to help support the expected shift of employees to different departments. Did not submit or incompletely chose and discussed two (2) domain-wide account policies that you believe would be effective to implement. Did not submit or incompletely explained at least (2) implications to planning an auditing strategy. No references provided you have taken to educate broad users will differ from the specialized education needed for higher-level security. you have taken to educate broad users will differ from the specialized education needed for higher-level security. you have taken to educate broad users will differ from the specialized education needed for higher-level security. you have taken to educate broad users will differ from the specialized education needed for higher-level security.

Insufficiently described two (2) benefits of creating OUs to represent different functional departments. Insufficiently proposed a way you can easily move users between OUs to help support the expected shift of employees to different departments. Insufficiently chose and discussed two (2) domain-wide account policies that you believe would be effective to implement. Insufficiently explained at least (2) implications to planning an auditing strategy. Does not meet the required number of references; all references poor quality choices. 7-8 errors present

Partially described two (2) benefits of creating OUs to represent different functional departments. Partially proposed a way you can easily move users between OUs to help support the expected shift of employees to different departments. Partially chose and discussed two (2) domainwide account policies that you believe would be effective to implement.

Satisfactorily described two (2) benefits of creating OUs to represent different functional departments. Satisfactorily proposed a way you can easily move users between OUs to help support the expected shift of employees to different departments. Satisfactorily chose and discussed two (2) domain-wide account policies that you believe would be effective to implement. Satisfactorily explained at least (2) implications to planning an auditing strategy. Meets number of required references; all references high quality choices.

Thoroughly described two (2) benefits of creating OUs to represent different functional departments. Thoroughly proposed a way you can easily move users between OUs to help support the expected shift of employees to different departments. Thoroughly chose and discussed two (2) domain-wide account policies that you believe would be effective to implement. Thoroughly explained at least (2) implications to planning an auditing strategy. Exceeds number of required references; all references high quality choices. 0-2 errors present11

4b. Propose a way you can easily move users between OUs to help support the expected shift of employees to different departments. Weight: 10% 5a. Choose and discuss two (2) domain-wide account policies that you believe would be effective to implement. Weight: 5%

5b. Explain at least (2) implications to planning an auditing strategy. Weight: 5%

Partially explained at least (2) implications to planning an auditing strategy. Does not meet the required number of references; some references poor quality choices. 5-6 errors present

6. 3 references Weight: 5%

7. Clarity, writing mechanics, and

More than 8 errors present

3-4 errors present

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 409 Student Version 1132 (1143 8-6-2012) Final Page 15 of 25

CIS 409 Assignments and Rubrics


formatting requirements Weight: 10%

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 409 Student Version 1132 (1143 8-6-2012) Final Page 16 of 25

Vous aimerez peut-être aussi