Answer:
1. Option (a) is the correct answer. "Place a firewall between the Internet and your Web server".
2. Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".
3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".
4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".
5. Option (c) is the correct answer. "Enforce password complexity".
Explanation:
1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.
2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.
3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.
4.All personnel will be taught the network policies to avoid sending report to unsecured printers.
5. The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.
The type of data which causes concern for institutions or business when collected, stored, and not secured properly is Personal Identifying Information. The correct option is B.
<h3>What is personal identifying information?</h3>
A personal identifying information is the representation of data or information of an individual that can be used to identify an individual specifically.
Some examples of a personal identifying information includes Social security number (SSN), E-mail address, Driver's license number. Bank account number, Full name and Passport number.
Business organizations should secure personal identifying information properly, in order to avoid unauthorized access by hackers.
Thus, the correct option is B.
Learn more about personal identifying information.
brainly.com/question/4997276
#SPJ1
Answer:
Joint Application Development (JAD)
Explanation:
Joint Application Development is a method of application development that lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.
Answer:
Explanation:
A good cloud-based hosting has many beneficial characteristics, some of which include on-demand self-service, broad network access, and being very elastic and scalable. These characteristics allow for a large number of users to benefit from the service at any time of the day and at a very fast speed due to the broad network access.
Answer:
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.
Explanation: