1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
11

You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why

it is important for all company roles to assist in securing the company’s network. You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in just 7 steps.
Include a discussion of each of the following in your response, being sure to emphasize the point(s) in the seven-layer OSI model where security is an issue, and listing specific security risks associated with each pain point:

Distributed vs. centralized computer systems and why your department chose to be distributed/centralized
Different network topologies and why your department chose the topology it did
Why standards bodies are essential in networking and how your department complies with standards
The importance of communication protocols and which one(s) your department chose
The differences between LAN, WAN, and wireless technologies, and how your department incorporated each
The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performance
Next, you plan to describe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, you describe some strategies your department follows to ensure the availability of network access in switched and routed networks.
Then, you describe at least three characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.
To reassure your audience of your network’s security, you list some strategies your department used to build security directly into the design of your company network.
Finally, malware has been in the news a lot lately, and you know you will be asked some questions about it. To answer them, you come up with a layperson-friendly definition of malware and identify at least two strategies your department has put into place for protecting your company’s network against malware.

Computers and Technology
1 answer:
Debora [2.8K]3 years ago
6 0

Answer:

Please see attachment for differentiation.

You might be interested in
An entrepreneur identifies and fills the gap between what the society needs and what is available is called​
valkas [14]

Explanation:

Therefore, an entrepreneur is an organization builder. 6. Gap-filling function – The gap between human needs and the available products

7 0
3 years ago
#include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid > 0 ) { value += 20; } printf(val
ss7ja [257]

Explanation:

To understand how this program is working let us print the variable value at different stages of the program so that we can understand how it is working.

Intitally, value=10 when it was declared.

Then we added 5 and it become value=15

then we used fork() function which creates a parent(orignal) and child(duplicate)

When fork() succeeds it returns the child pid to parent and returns 0 to the child. As you can see (pid > 0) condition is always true therefore the parent pid value becomes 35 ( 15+20) and the child pid value becomes 0.

#include <stdio.h>

#include <unistd.h>

int main( ) {

   int value = 10;

     printf("%d\n",value);

   int pid;

   value += 5;

     printf("%d\n",value);

   pid = fork( );

     printf("%d\n",pid);

   if (pid > 0 )

   {

       value += 20;

   }

   printf("%d\n",value);

   return 0;

}

Output:

10 (initial value)

15 (modified value)

5343 (pid when fork is used)

35 (final modified value)

0 (child value)

15 (the parent value when fork was used)

8 0
3 years ago
If you're doing a relational comparison, which filter would be available?
taurus [48]

Answer:

C. Number

Explanation:

If you're doing a relational comparison, a number filter would be available.

7 0
3 years ago
Which of the following is false about ERP II systems? Question 18 options: 1) They utilize the Web. 2) They include human resour
maks197457 [2]

Answer:

5) These ERP systems have no optional modules.

Explanation:

ERP II is a solution that comprises of the conventional materials planning, the distribution, and order-entry functionality reinforced by capabilities like consumer relationship management (CRM), the human resources management (HRM). A type of system like that can quickly, consistently and accurately operate the whole organization.

Some of the Examples of ERP system modules include: supply chain management (for example the manufacturing, purchasing and distribution of goods), product lifecycle management, warehouse management, customer relationship management (CRM), online sales, sales order processing, financials, human resources, and decision support scheme.

6 0
3 years ago
Write a program that prompts the user to enter a point (x, y) and checks whether the point is within the rectangle centered at (
Serga [27]

Answer:

## http://pastebin.com/nQWtHb3B

#use above link for formatted program #Python3

c=[float(cord) for cord in input('Enter a point with 2 coordinate :').split(' ')]

base=[0,0]

w=10

h=5

if((abs(c[0]-base[0])<= float(w)/2) and (abs(c[1]-base[1])<= float(h)/2)):

print('Point (',c[0],', ',c[1],') is in the rectange')

else:

print('Point (',c[0],', ',c[1],') is not in the rectange')

5 0
3 years ago
Other questions:
  • strategy that is used to help improve the chances that your site will be found by search engines is known as search engine
    12·1 answer
  • What processes are needed to transform a c++ program to a machine language program that is ready for execution?
    14·1 answer
  • To edit the color of the text in presentation software, choose the Font color command Text Color in the ________ ribbon toolbar.
    15·2 answers
  • HELPPPP!!
    8·2 answers
  • The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of betwee
    8·1 answer
  • Do you think I could create a working animatronic like the one from five nights at freddys
    12·2 answers
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • What word can you type using only the left home row keys and the right reach keys?
    6·2 answers
  • Explain the evolution of programming language​
    15·1 answer
  • Write a program that calculates the average of N integers. The program should prompt the
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!