Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In a technical field steeped in protocols and algorithms, creativity is indeed a vital quality for system administrators. Enterprise troubleshooting often requires an open -
In a technical field steeped in protocols and algorithms, creativity is indeed a vital quality for system administrators.
Enterprise troubleshooting often requires an openminded, holistic, and creative approach to isolate critical issues in
hardware, software, and the tech integrations that bind all of them together. Unique use cases arise every day and
require system administrators to consider alternate avenues of approach and test out novel solutions to new problems.
For this assignment, read the three scenarios. The resources included in each of the sections will help you construct a
response that addresses the following:
Major challenges involved in each scenario
Recommended approach for the system administrator involved in each scenario
Scenario
An American global entertainment company wants to offer free wireless internet connectivity at all US East Coast
events this coming summer. Venues will vary and consist of indoor and outdoor facilities with readybuilt stages and a
typical capacity for to people. Their infrastructure team is currently defining the requirements for a rapid
deployment mobile infrastructure package that will support the maximum number of devices based on venue capacity.
The infra team requires your input as a system administrator to ensure they capture the requirements for device
configuration, hardening, and maintenance.
Resources
Securing Wireless Networks Eby CISA
Hardening Network Devices Bby NSA
Scenario
Your threat intel team has informed you of a vulnerability on Windows systems that allows unprivileged users to access
and extract data from protected registry hives.
An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker
could then install programs; view, change, or delete data; or create new accounts with full user rights." Microsoft nd
Your team of system engineers have developed a patch to mitigate this vulnerability, but they are asking for your ideas
on automated methods to implement it across all impacted systems rapidly.
Resource
HiveNightmare ZeroDay Lets Anyone Be SYSTEM on Windows and Gby Pieter Arntz
Scenario
Work morale is booming, as your company's recent acquisition of a large national rental car company is certain to give a
tremendous financial boost to the bottom line. Massive annual employee bonuses look promising, but your team has a
prodigious challenge aheadsecurely migrating the acquired company's active directory into your own.
Resource
M&A The Merger that Can Fracture Your Active Directory... and Your Business by ALSID
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started