Evaluate the network requirements of the user and design an appropriate file and folder structure.
· Create the designed file and folder structure using appropriate administration and system tools. Document the file system using a security matrix.
· List five matters that would need to be considered when designing a file service.
- What types of systems are ‘mission critical'?
- What are the steps to follow when carrying out a risk analysis on the network?
- List five threats to a network that should be considered in a risk analysis.
- List precautions an organisation can take to prevent or minimise the impact of disastrous events.
- List the options an organisation can use to recover from a disaster.
1. Configure a Windows 2000 server to provide secure access and logs for the Legal Department.
2. Write a report on how the access is managed. You will need to:
a. Examine resources to confirm and limit the access to files, folders, databases and overall file system, to organisational requirements.
Analyse the access log that reveals details about times and users accessing the file system
1. Prepare a report on illegal software found on workstations, based on the Software audit and Software inventory
Descrbe the steps you would take to check for illegal software on workstations. Add a printer to be shared on the network.