Explore BrainMass
Share

Computer Networking

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

One of Nichol's network technicians says she doesn't believe the servers are capable of handling Windows Server 2008. She adds that Nichol has:

Four servers that each contain 1 GHz processors, 256 MB of RAM, dual NICs, dual power supplies, DVD-ROM drives, and 20-GB hard drives.
eight servers that each contain 2 GHz processors, dual NICs, dual power supplies, dual hard drives, DVD-ROM drives, and 40 GB hard drives
Two servers that each contain 500 MHz processors, 256 MB of RAM, single NICs, single power supplies, CD-ROM drives, and 10GB hard drives

Explain what components she'll need to add or upgrade, at minimum, to make Nichol's servers capable of running Windows Server 2008. Also, explain why you don't recommend leaving all the servers at the minimum hardware requirements. Write down four questions you will ask the Nichol technicians about their network environment to help determine which servers might need more system resources.

© BrainMass Inc. brainmass.com October 17, 2018, 3:37 am ad1c9bdddf
https://brainmass.com/computer-science/networking/430230

Solution Summary

This posting contains the solution to the given problems.

$2.19
Similar Posting

Computer Network Security

1. What is the one thing that a virus, a worm, spyware and malicious code have in common? What are the differences among these four threats?
2. How often should you update your anti-virus protection?
3. Why is a best practice to have and to carry an anti-virus boot-up disk or CD?
4. What other anti-malicious software and anti-malicious code applications are included with AVG? What risk and threats do these help mitigate?
5. In a corporate environment, should new AV definitions be installed as soon as they are available?
6. Is the quick scan good enough protection for a system?
7. Besides the ones mentioned above, what other best practices are there for the workstation domain that can mitigate the risks and threats caused by malicious code?
8. If you have an up-to-date AV, do you still need a malware detection program like Windows Defender?
9. What some of the most common symptoms of malware?
10. What are examples of harmful spyware application? What risk or threat do they pose to the workstation domain?

View Full Posting Details