1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
12

As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The

credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town. The headquarters has the following equipment:
- Ten Windows 7 and ten Windows 10 workstations, connected to a Windows Server 2008 R2 file server - One Windows Server 2008 R2 RRAS server accessed by home workers after hours
-One Windows Server 2008 R2 print server
- One Linux database server
-One Web server for members to check their account balances online
-One firewall where the network connects to the credit union’s ISP via a T3 dedicated link
The east-side office has five Windows 7 workstations, connected to the headquarters office Windows Server 2008 R2 server through a T1 link. At the headquarters, the servers reside in a locked room that admits authorized users with an electronic badge access system. Both locations have numerous security cameras, including cameras in the computer room. The manager also tells you that the credit union has a security policy that all employees are required to read and sign when they become employees. He believes that the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches. In response, create a checklist of items on this network that should be evaluated for security. Sketch a network diagram for the credit union (remember to include connectivity devices necessary for the LAN and WAN connections). Describe any entry points (physical or data transmission related) or situations that constitute potential security risks. In addition, explain how the credit union manager could better train his employees to understand network security.
Computers and Technology
1 answer:
ale4655 [162]3 years ago
8 0

Answer:1987

Explanation:guess

You might be interested in
A surface
givi [52]

Answer:

3 Pa

Explanation:

pressure = force / area

6 0
3 years ago
WILL GIVE BRAINLIEST!!!!!!!
denpristay [2]

Answer:

A drill is one of the most important tools a dentist can have. They run on pneumatic systems which gives the drill power and precision.

Explanation:

So, false

3 0
2 years ago
Read 2 more answers
In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
Tcecarenko [31]

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

4 0
3 years ago
Question / UJU
DIA [1.3K]

Answer:

Option D: If it is the month of January, then the temperature is cool.

Explanation:

A conditional statement is the one having an if condition in it that says, if the condition is true proceed to the next statement, else not.

Given statements are:

  • If it is the month of January, then it is winter.

This can be written as: if (January)⇒Winter

  • If it is winter, then the temperature is cool.

This can be written as: if (winter)⇒ Temperature(cool)

So by combining both the statements, the winter clause will be connected  and we get:

if(January)⇒Temperature (cool)

This can be written as:

  • If it is the month of January, then the temperature is cool.

So, Option D is the correct answer.

i hope it will help you!

5 0
3 years ago
What are some types of vehicle technology advancements?
julia-pushkina [17]

Answer:

D is the suitable answer.

Explanation:

All of the above

5 0
3 years ago
Other questions:
  • Compute the bitwise XOR between 10010100 and 11101010.
    12·1 answer
  • In the URL, what is the subdomain and what is the domain name?
    5·1 answer
  • Which of the following that can be use to access session variables in PHP?
    14·1 answer
  • Write a function namedmake_complex that stores its twoarguments (both of type double) in acomplex structure, then returns thestr
    12·1 answer
  • Can you please answer the question in the picture ! :)
    6·1 answer
  • How should you mark the query if it is a valid one?
    9·1 answer
  • How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data
    12·2 answers
  • Javed’s teacher tells him she would like to see him improve his speaking skills in the next debate by including a rhetorical app
    9·1 answer
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
  • The three main objectives of information security are.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!