Category Archives: CIS 329

Strayer CIS 329 quiz updated

Strayer CIS 329 quiz updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-quiz-updated

For more classes visit

www.homeworkrank.com

CIS 329 quiz updated

Question 1

What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?

Question 2

  

If you are currently running Windows 8 on your computer, what is the easiest way to upgrade to Windows 8 Professional?

Question 3

  

Which of the following methods is not a way to close unused apps that are still running on a Windows 8 computer?

Question 4

  

Computers running Windows PE will automatically shut down and reboot after how long?

Question 5

  

During what phase of the Windows 8 startup process is the Local Security Authority loaded?

Question 6

  

Before performing an upgrade to Windows 8, several tasks should be performed to ensure the procedure goes smoothly. Which of the following is not one of these tasks?

Question 7

  

What name is given to a Windows PE installation on a computer with Windows 8 already installed?

Question 8

  

Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?

Question 9

  

You have a small number of Windows XP computers in your organization. You need to manually move as much data from the user profile locations for these computers as possible to the updated Windows 8 computers these users will be receiving shortly. Where in the file system would you find the profile information?

Question 10

  

The User State Migration Tool uses several files to control the migration process. What is the file format of these files?

Question 11

  

What should you enter into the Run dialog box to open the Device Manager console?

Question 12

  

What is the value of a protected checksum dependent upon?

Question 13

0 out of 2 points

  

On which tab of a driver’s properties dialog box will you find information about any conflicts the driver may be experiencing?

Question 14

  

What Windows 8 feature assigns one of four integrity levels to running processes?

Question 15

  

What is the executable file name for the Windows Installer application on a Windows 8 computer?

Question 16

  

What Windows 8 feature prevents applications from executing code in prohibited areas?

Question 17

  

Using a single Microsoft account, on how many Windows 8 devices can you install a specific Windows app?

Question 18

  

Which of the following is not an AppLocker rule collection type available for usage when creating AppLocker rules?

Question 19

  

What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?

Question 20

  

When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except

which one?

Question 21

  

What updated standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?

Question 22

  

By default, IE 10 is granted access to which area of the computer?

Question 23

  

Which Hyper-V virtual switch feature provides protection against a malicious virtual machine attempting to steal IP addresses from other virtual machines?

Question 24

  

Snapshot data files are stored using what file format?

Question 25

  

What PowerShell cmdlet can you use to enable Client Hyper-V?

 

Strayer CIS 329 week 4 quiz 1 updated

Strayer CIS 329 week 4 quiz 1 updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-week-4-quiz-1-updated

For more classes visit

www.homeworkrank.com

CIS 329 week 4 quiz 1 updated

Question 1

• Question 1

When considering an upgrade to Windows 8, several critical questions must be considered. Which of the following is not one of these questions to consider?

• Question 2

  

Which edition of Windows 8 includes Office 2013 installed already but does not offer a choice of 32-bit or 64-bit versions?

• Question 3

  

What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?

• Question 4

  

Which of the following should be used to locate hardware inadequacies in the computer that might prevent a successful upgrade to Windows 8?

• Question 5

  

What name is given to a Windows PE installation on a computer with Windows 8 already installed?

  

• Question 6

  

During what phase of the Windows 8 startup process is the Local Security Authority loaded?

• Question 7

  

Computers running Windows PE will automatically shut down and reboot after how long?

• Question 8

  

What is the name of the USMT application that is used to save user profile data for a migration?

• Question 9

  

In the scenario where you are installing Windows 8 on a updated computer and plan to dispose of an old computer running Windows XP, which Windows Easy Transfer method would be most appropriate to use?

• Question 10

  

Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?

• Question 11

  

To communicate with the operating system running on the computer, each device also requires a software element known as what?

• Question 12

  

What is the value of a protected checksum dependent upon?

• Question 13

  

You have opened the Properties dialog box for an installed printer on your computer system. On what tab will you find information that is specific to this piece of installed hardware on your computer system?    

• Question 14  

You have PhotoShop Elements installed on your Windows 8 computer. You want PhotoShop Elements to automatically be launched every time you plug in a memory card that contains photos. What setting do you need modify?

• Question 15  

Windows Installer uses what file format for single package application installations?      

• Question 16

  

What is the name of the Remote Desktop Services feature that enables clients to run Remote Desktop server applications within an individual window?  

• Question 17

  

What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?

• Question 18

  

When you create your first updated rule in AppLocker, what will happen if you do not have the default rules in place?    

• Question 19

  

By default, Windows 8 is configured to check for updates for installed apps _________ and then _________ the needed updates.    

• Question 20

  

Which of the following is not one of the methods that the SmartScreen Filter uses to identify potential phishing web sites?    

• Question 21

  

When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except

which one?    

• Question 22

  

What updated standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?

• Question 23

  

What PowerShell cmdlet can you use to enable Client Hyper-V?    

• Question 24

  

Snapshot data files are stored using what file format?    

• Question 25

  

What Hyper-V feature helps you use physical memory more efficiently for your VMs?

 

Strayer CIS 329 Week 6 Quiz 2 updated

Strayer CIS 329 Week 6 Quiz 2 updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-week-6-quiz-2-updated

For more classes visit

www.homeworkrank.com

CIS 329 Week 6 Quiz 2 updated

• Question 1

  When considering an upgrade to Windows 8, several critical questions must be considered. Which of the following is not one of these questions to consider?

• Question 2

  Which edition of Windows 8 includes Office 2013 installed already but does not offer a choice of 32-bit or 64-bit versions?

• Question 3

  What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings?

• Question 4

  Which of the following should be used to locate hardware inadequacies in the computer that might prevent a successful upgrade to Windows 8?

• Question 5

  What name is given to a Windows PE installation on a computer with Windows 8 already installed?

• Question 6

  During what phase of the Windows 8 startup process is the Local Security Authority loaded?

• Question 7

  Computers running Windows PE will automatically shut down and reboot after how long?

• Question 8

  What is the name of the USMT application that is used to save user profile data for a migration?

• Question 9

  In the scenario where you are installing Windows 8 on a updated computer and plan to dispose of an old computer running Windows XP, which Windows Easy Transfer method would be most appropriate to use?

• Question 10

  Your organization currently uses roaming profiles for all users. All users use Windows 7 computers.  Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of?

• Question 11

  To communicate with the operating system running on the computer, each device also requires a software element known as what?

• Question 12

  What is the value of a protected checksum dependent upon?

• Question 13

  You have opened the Properties dialog box for an installed printer on your computer system. On what tab will you find information that is specific to this piece of installed hardware on your computer system?

• Question 14

  You have PhotoShop Elements installed on your Windows 8 computer. You want PhotoShop Elements to automatically be launched every time you plug in a memory card that contains photos. What setting do you need modify?

• Question 15

  Windows Installer uses what file format for single package application installations?

• Question 16

  What is the name of the Remote Desktop Services feature that enables clients to run Remote Desktop server applications within an individual window?

• Question 17

  What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?

• Question 18

  When you create your first updated rule in AppLocker, what will happen if you do not have the default rules in place?

• Question 19

  By default, Windows 8 is configured to check for updates for installed apps _________ and then _________ the needed updates.

• Question 20

  Which of the following is not one of the methods that the SmartScreen Filter uses to identify potential phishing web sites?

• Question 21

  When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except

which one?

• Question 22

  What updated standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP?

• Question 23

  What PowerShell cmdlet can you use to enable Client Hyper-V?

• Question 24

  Snapshot data files are stored using what file format?

• Question 25

  What Hyper-V feature helps you use physical memory more efficiently for your VMs?

• Question 1

  What is the largest danger that high-capacity removable storage devices pose to an enterprise network?

• Question 2

0 out of 2 points

  When none of your configured Software Restriction Policies are matched, what happens?

• Question 3

  When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results?

• Question 4

  In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Access policy settings, what will you need to know about each device to which you wish to allow read or write access?

• Question 5

  Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from?

• Question 6 

  The process of applying a header and footer to a data packet is known as what?

• Question 7

0 out of 2 points

  What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network?

• Question 8

  In the OSI model, which layer is at the bottom and represents the hardware that forms the network?

• Question 9

0 out of 2 points

  Most cabled networks today use what type of cabling?

• Question 10

  What protocol do most devices currently use at the Network layer?

• Question 11

0 out of 2 points

  What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?

• Question 12

  A 2×2 MIMO device has how many total transceivers?

• Question 13

  Why should you not deploy a wireless network using WEP for security?

• Question 14

  802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process?

• Question 15

  What command can you issue from the command line to view all configured wireless networks on your Windows 8 computer?

• Question 16

0 out of 2 points

  When do data protection technologies such as the Windows 8 Encrypting File System (EFS) and BitLocker protect data?

• Question 17

  What term is given to software that includes viruses, Trojan horses, worms, spyware, and adware?

• Question 18

  When using the Windows Firewall with Advanced Security console, you will see three distinct network locations that impact the behavior of the Windows Firewall. Which of the following is not one of these network locations used by the Windows Firewall?

• Question 19

  Which of the following is not an item that can be used when building Windows Firewall rules?

• Question 20

  Which of the following items is not found in the Security section of the Windows 8 Action Center?

• Question 21

  Remote Assistance offers several methods to send the invitation for assistance. Which of the following is not one of those options?

• Question 22

  Remote Assistance requires that access to what port be available on the requesting client?

• Question 23

  What is the name of the feature that enables an administrator, trainer, or technical specialist at one location to connect to a distant user’s computer, chat with the user, and either view all the user’s activities or take complete control of the system?

• Question 24

  Why do some snap-ins, such as the Active Directory Domain Services consoles, not provide a means to redirect the console to another computer?

• Question 25

  What makes connecting to a remote computer by redirecting an existing console an inefficient method over time?

Strayer CIS 329 Week 6 quiz updated

Strayer CIS 329 Week 6 quiz updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-week-6-quiz-updated

For more classes visit

www.homeworkrank.com

CIS 329 Week 6 quiz updated

• Question 1

What is the largest danger that high-capacity removable storage devices pose to an enterprise network?

• Question 2

0 out of 2 points

When none of your configured Software Restriction Policies are matched, what happens?

• Question 3

When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results?

• Question 4

In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Access policy settings, what will you need to know about each device to which you wish to allow read or write access?

• Question 5

Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from?

• Question 6

The process of applying a header and footer to a data packet is known as what?

• Question 7

0 out of 2 points

What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network?

• Question 8

In the OSI model, which layer is at the bottom and represents the hardware that forms the network?

• Question 9

0 out of 2 points

Most cabled networks today use what type of cabling?

• Question 10

What protocol do most devices currently use at the Network layer?

• Question 11

0 out of 2 points

What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?

• Question 12

A 2×2 MIMO device has how many total transceivers?

• Question 13

Why should you not deploy a wireless network using WEP for security?

• Question 14

802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process?

• Question 15

What command can you issue from the command line to view all configured wireless networks on your Windows 8 computer?

• Question 16

When do data protection technologies such as the Windows 8 Encrypting File System (EFS) and BitLocker protect data?

• Question 17

What term is given to software that includes viruses, Trojan horses, worms, spyware, and adware?

• Question 18

When using the Windows Firewall with Advanced Security console, you will see three distinct network locations that impact the behavior of the Windows Firewall. Which of the following is not one of these network locations used by the Windows Firewall?

• Question 19

Which of the following is not an item that can be used when building Windows Firewall rules?

• Question 20

Which of the following items is not found in the Security section of the Windows 8 Action Center?

• Question 21

Remote Assistance offers several methods to send the invitation for assistance. Which of the following is not one of those options?

• Question 22

Remote Assistance requires that access to what port be available on the requesting client?

• Question 23

What is the name of the feature that enables an administrator, trainer, or technical specialist at one location to connect to a distant user’s computer, chat with the user, and either view all the user’s activities or take complete control of the system?

• Question 24

Why do some snap-ins, such as the Active Directory Domain Services consoles, not provide a means to redirect the console to another computer?

• Question 25

What makes connecting to a remote computer by redirecting an existing console an inefficient method over time?

Strayer CIS 329 Week 8 Quiz 3 updated

Strayer CIS 329 Week 8 Quiz 3 updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-week-8-quiz-3-updated

For more classes visit

www.homeworkrank.com

CIS 329 Week 8 Quiz 3 updated

• Question 1

How do you start the process to modify the default homegroup sharing configuration?

• Question 2

Which of the following statements is true of Public folder sharing?

• Question 3

0 out of 2 points

For users at home, which file sharing is most likely the simplest to setup and use?

• Question 4

What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?

•       Share permission (Share tab)—Sales group: Full Control

•       NTFS permission (Security tab)—Sales group: Read & Execute, Modify, Write

• Question 5

It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?

• Question 6

What is the maximum support file name length in the NTFS file system?

• Question 7

When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources, and events you want to audit. Which of the items listed is not one of the items typically considered?

• Question 8

If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder?

• Question 9

0 out of 2 points

Regarding NTFS permissions, when you move NTFS files or folders from one volume to another, which of the following statements is true?

• Question 10

When using the iacls.exe utility, what flag (e.g., /?) is used to specify that the command should be executed on all files and subfolders contained in the starting folder location?

• Question 11

What is the default setting for UAC in Windows 8?

• Question 12

What is the most common method by which phishing attacks are launched?

• Question 13

What is the intended function of the User Account Control (UAC) feature in Windows?

• Question 14

How long after you complete the configuration of local security policies on a computer will it take for those policies to become effective?      

• Question 15

How can you fully disable UAC in Windows 8?

• Question 16

What must you do, at a minimum, before you can manage domain objects on a Windows 8 workstation?    

• Question 17

Where are user accounts stored for computers that are in a workgroup?  

• Question 18

Which of the following is not an allowed gesture for a picture password?

• Question 19

Which of the following items is not supported as a method of authentication in Windows 8?

• Question 20

Generally speaking, which of the following password conditions is not considered to be part of a strong password?

• Question 21

If you have Windows 8 Professional workstation clients on your network, what single BranchCache protocol will they be limited to using?

• Question 22

When using distributed-cache mode for BranchCache, where is the cache hosted in the branch office?    

• Question 23  

You must deploy at least one or more BranchCache-enabled servers at your main office to enable BranchCache. Which of the following server types is not an option as a BranchCache-enabled server?    

• Question 24

What is the main difference between BranchCache version 1 and version 2?    

• Question 25

What advantage does the usage of SSTP for VPN connections offer firewall administrators?

 

Strayer CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 updated

Strayer CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-week-10-assignment-1-preparing-for-a-company-wide-migration-to-windows-8

For more classes visit

www.homeworkrank.com

CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 updated

Assignment 1: Preparing for a Company-Wide Migration to Windows 8

Due Week 10 and worth 160 points

Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additional manufacturing facilities located in Nebraska and Maryland.

There are 250 employees in the Texas location, 175 in Maryland, and 25 in Nebraska. All locations use Windows 7 as the primary client operating system. The systems at the Maryland location are over five (5) years old. CMI’s Information Technology (IT) department upgraded the computer systems with updated hardware within the past year at all other company locations. These upgraded computer systems are capable of running Windows 8. CMI recently upgraded all of its servers to run Windows Server 2012 in an Active-Directory-based environment.

The Operations, Marketing, Administration, IT Support, and Finance departments are located in the Texas location. Nebraska is primarily a manufacturing location that is staffed by production line employees, a line supervisor, and a plant manager. The Maryland office also includes an operations component (i.e., production line employees, line supervisor, and plant manager), a small IT department, and the company’s human resources department.

The current IT support staff comprises a seasoned group of individuals that collectively have over ten (10) years of experience in network administration and working with Microsoft operating systems. Many of the IT staff have recently completed training on the Windows 8 operating system and are well-versed in supporting Windows Server 2008 and 2012. The remainder of the company’s employees has only a basic knowledge of Windows 7 and relies on the company’s help desk to solve a majority of its computer problems. CMI has a team of 50 salespeople who use laptops and tablets while working from their home offices. These employees, who travel extensively with their laptops, must have their systems secured in case of loss or theft. The laptops, purchased over five (5) years ago, run the Windows 7 operating system. The tablets, used only by a subset of the sales staff, are iPads running iOS 7.

The Chief Information Officer (CIO) is concerned about employees installing non-standard company applications downloaded from the Windows Store both while at work and when they have their devices at home. The CIO also wants to ensure that those persons on the IT staff are the only individuals authorized to update Windows Store apps. The CIO has an IT support staff of ten (10) employees and does not want to increase the number of applications that need to be supported via the company’s help desk. The help desk is currently staffed by three (3) employees from 8:00 a.m. − 5:00 p.m. (CST).

Hardware and software compatibility issues experienced during the upgrade to Windows 7 several years earlier resulted in the company going over budget by several thousands of dollars. The CFO stated that the reason for going over budget was directly related to problems with their business critical applications not being fully compatible with Windows 7. The applications are used by the Operations department to track inventory, schedule production runs, handle purchase orders, and track product shipments. Senior management wants to address software compatibility testing prior to moving the entire company to Windows 8. They are also concerned about the time it might take to migrate user settings and applications over to the updated Windows 8 operating system, the time to train employees on using the updated interface, the overall impact on the company’s help desk, and day-to-day operations.

The CIO and Chief Financial Officer (CFO) want more information before making the decision to upgrade to Windows 8 and have asked you to write a report that addresses their concerns and also includes your recommendations on how best to proceed, should the project be approved.

Write an eight to ten (8-10) page paper in which you:

1. Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole.

2. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:

1. Identify the number of systems, by location and / or departments that IT must replace with updated or compatible hardware.

2. Recommend whether the organization should use a phased-in approach (i.e., upgrades are sequenced by departments and / or locations) or a flash-cut approach (i.e., all at once) in order to upgrade to Windows 8. If a phased-in approach is recommended, identify the departments and / or locations you would upgrade, and describe the preferred upgrade sequence. Support your recommendations.

3. Address the length of time in which the upgrade should occur, and identify the main issues which could impact the specified time frame.

4. Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications.

3. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete.

4. Examine the pros and cons of configuring AppLocker to standardize the software used by employees across the organization.

5. Explain the process and options available for managing application installations and updates via the Windows Store, and thus addressing the concerns voiced by the CIO.

6. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Demonstrate the ability to install and configure a client operating system, applications, and associated updates as well as designing a client operating system installation strategy.

• Validate and successfully install a computer client operating system.

• Demonstrate the ability to discuss the migration phases and considerations in a client operating system installation to include virtual machines and the cloud infrastructure.

• Demonstrate the ability to apply technology tools to monitor and configure applications and network performance.

• Use technology and information resources to research issues in operating system environments.

• Write clearly and concisely about desktop administration and operating system topics using proper writing mechanics and technical style conventions.

 

Strayer CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 updated

Strayer CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-week-10-assignment-1-preparing-for-a-company-wide-migration-to-windows-8

For more classes visit

www.homeworkrank.com

CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 updated

Assignment 1: Preparing for a Company-Wide Migration to Windows 8

Due Week 10 and worth 160 points

Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additional manufacturing facilities located in Nebraska and Maryland.

There are 250 employees in the Texas location, 175 in Maryland, and 25 in Nebraska. All locations use Windows 7 as the primary client operating system. The systems at the Maryland location are over five (5) years old. CMI’s Information Technology (IT) department upgraded the computer systems with updated hardware within the past year at all other company locations. These upgraded computer systems are capable of running Windows 8. CMI recently upgraded all of its servers to run Windows Server 2012 in an Active-Directory-based environment.

The Operations, Marketing, Administration, IT Support, and Finance departments are located in the Texas location. Nebraska is primarily a manufacturing location that is staffed by production line employees, a line supervisor, and a plant manager. The Maryland office also includes an operations component (i.e., production line employees, line supervisor, and plant manager), a small IT department, and the company’s human resources department.

The current IT support staff comprises a seasoned group of individuals that collectively have over ten (10) years of experience in network administration and working with Microsoft operating systems. Many of the IT staff have recently completed training on the Windows 8 operating system and are well-versed in supporting Windows Server 2008 and 2012. The remainder of the company’s employees has only a basic knowledge of Windows 7 and relies on the company’s help desk to solve a majority of its computer problems. CMI has a team of 50 salespeople who use laptops and tablets while working from their home offices. These employees, who travel extensively with their laptops, must have their systems secured in case of loss or theft. The laptops, purchased over five (5) years ago, run the Windows 7 operating system. The tablets, used only by a subset of the sales staff, are iPads running iOS 7.

The Chief Information Officer (CIO) is concerned about employees installing non-standard company applications downloaded from the Windows Store both while at work and when they have their devices at home. The CIO also wants to ensure that those persons on the IT staff are the only individuals authorized to update Windows Store apps. The CIO has an IT support staff of ten (10) employees and does not want to increase the number of applications that need to be supported via the company’s help desk. The help desk is currently staffed by three (3) employees from 8:00 a.m. − 5:00 p.m. (CST).

Hardware and software compatibility issues experienced during the upgrade to Windows 7 several years earlier resulted in the company going over budget by several thousands of dollars. The CFO stated that the reason for going over budget was directly related to problems with their business critical applications not being fully compatible with Windows 7. The applications are used by the Operations department to track inventory, schedule production runs, handle purchase orders, and track product shipments. Senior management wants to address software compatibility testing prior to moving the entire company to Windows 8. They are also concerned about the time it might take to migrate user settings and applications over to the updated Windows 8 operating system, the time to train employees on using the updated interface, the overall impact on the company’s help desk, and day-to-day operations.

The CIO and Chief Financial Officer (CFO) want more information before making the decision to upgrade to Windows 8 and have asked you to write a report that addresses their concerns and also includes your recommendations on how best to proceed, should the project be approved.

Write an eight to ten (8-10) page paper in which you:

1. Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole.

2. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:

1. Identify the number of systems, by location and / or departments that IT must replace with updated or compatible hardware.

2. Recommend whether the organization should use a phased-in approach (i.e., upgrades are sequenced by departments and / or locations) or a flash-cut approach (i.e., all at once) in order to upgrade to Windows 8. If a phased-in approach is recommended, identify the departments and / or locations you would upgrade, and describe the preferred upgrade sequence. Support your recommendations.

3. Address the length of time in which the upgrade should occur, and identify the main issues which could impact the specified time frame.

4. Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications.

3. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete.

4. Examine the pros and cons of configuring AppLocker to standardize the software used by employees across the organization.

5. Explain the process and options available for managing application installations and updates via the Windows Store, and thus addressing the concerns voiced by the CIO.

6. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Demonstrate the ability to install and configure a client operating system, applications, and associated updates as well as designing a client operating system installation strategy.

• Validate and successfully install a computer client operating system.

• Demonstrate the ability to discuss the migration phases and considerations in a client operating system installation to include virtual machines and the cloud infrastructure.

• Demonstrate the ability to apply technology tools to monitor and configure applications and network performance.

• Use technology and information resources to research issues in operating system environments.

• Write clearly and concisely about desktop administration and operating system topics using proper writing mechanics and technical style conventions.

Strayer CIS 329 Week 11 Quiz updated

Strayer CIS 329 Week 11 Quiz updated

To purchase this material click below link

http://www.homeworkrank.com/cis-329-strayer/cis-329-week-11-quiz-updated

For more classes visit

www.homeworkrank.com

CIS 329 Week 11 Quiz updated

• Question 1

   Which of the following is not an option on the Second screen menu of Windows 8?

• Question 2

What Windows keyboard combination can you use to project to a second screen? 

• Question 3

Which power plan is not shown by default in the Power Options control panel?

• Question 4

How does Windows 8 transmit display signals to a network projector?

• Question 5

  When using BitLocker To Go, which of the following that is typically associated with BitLocker is not required to unlock the drive?

• Question 6 

  Of the listed BitLocker authentication methods, which is considered to be the least secure?

• Question 7

What name is given to the user account(s) that have been authorized to recover BitLocker drives for an organization?

• Question 8 

  If the Configure Automatic Updates policy is not enabled and applied to the devices along with other Windows Update settings, what will happen?      

• Question 9

What is the maximum value of the Delay Restart for scheduled installations policy?

• Question 10

What is the default value of the Delay Restart for scheduled installations policy?

• Question 11

How many active partitions can a hard disk hold?

• Question 12

  What is a limitation of dynamic disks?

• Question 13

  What benefit is provided by the updated Storage Spaces feature of Windows 8?

• Question 14

What PowerShell cmdlet can be used to display the Event Logs?

• Question 15    What keyboard combination will directly open the Task Manager in Windows 8?

• Question 16

  You can associate several actions to occur upon a specific event occurring.  Which of the listed actions is not one of the available options?

• Question 17 What name is given to a set of readings, captured under normal operating conditions, which you can save and compare to readings taken at a later time?

• Question 18

  To restore the computer from a system image backup, what must you do?   

• Question 19

What is the limitation of using a USB flash drive as the backup destination when using Windows 7 File Recovery?   

• Question 20

In which Control Panel view will you not be able to find the Windows 7 File Recovery option?

• Question 21

You can use Group Policy to configure how Windows responds when a user tries to install device drivers that are not digitally signed. Which of the following options is not available for this configuration?

• Question 22 

  When a startup failure occurs before the logon user interface appears, the problem could be hardware related, but it is most likely due to an issue with one of the drivers or services that the kernel is attempting to load. To locate the offending driver or service, you must first attempt to get the computer started by using what?   

• Question 23 

  What organization is responsible for the testing and verification of compatibility, reliability, and functionality of drivers for hardware devices?       

• Question 24  If File History is enabled, what will be the status of Windows 7 File Recovery on the computer?

• Question 25   

  What is the primary method of file recovery for a Windows 8 computer?