1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
12

As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The

credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town. The headquarters has the following equipment:
- Ten Windows 7 and ten Windows 10 workstations, connected to a Windows Server 2008 R2 file server - One Windows Server 2008 R2 RRAS server accessed by home workers after hours
-One Windows Server 2008 R2 print server
- One Linux database server
-One Web server for members to check their account balances online
-One firewall where the network connects to the credit union’s ISP via a T3 dedicated link
The east-side office has five Windows 7 workstations, connected to the headquarters office Windows Server 2008 R2 server through a T1 link. At the headquarters, the servers reside in a locked room that admits authorized users with an electronic badge access system. Both locations have numerous security cameras, including cameras in the computer room. The manager also tells you that the credit union has a security policy that all employees are required to read and sign when they become employees. He believes that the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches. In response, create a checklist of items on this network that should be evaluated for security. Sketch a network diagram for the credit union (remember to include connectivity devices necessary for the LAN and WAN connections). Describe any entry points (physical or data transmission related) or situations that constitute potential security risks. In addition, explain how the credit union manager could better train his employees to understand network security.
Computers and Technology
1 answer:
ale4655 [162]3 years ago
8 0

Answer:1987

Explanation:guess

You might be interested in
Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
Marina86 [1]
The correct answer for this question is this one: "She can rename the 2 worksheet by right clicking the sheet tab. After right clicking the mouse, select Rename Sheet and type the preferred name of the sheet."  Hope this helps answer your question and have a nice day ahead.
5 0
3 years ago
Read 2 more answers
By using the Office Button Wird and PowerPoint will print your document without displaying an options dialog box
Vinvika [58]
What do you mean by that?
4 0
3 years ago
Shapes in the Shapes gallery can be combined to show relationships among the elements.
LUCKY_DIMON [66]
Yes, this statement is true.
Actually this statement is about using Microsoft PowerPoint, shapes in the shape gallery can be combined to show relationships among the elements.
In the shape gallery of Microsoft PowerPoint, there are many shapes such as oval, square, rectangle, star, line and many more. One can use any shape to illustrate the concept or to show relationship between something.
8 0
2 years ago
Which type of data is presented on the y-axis?
den301095 [7]
For example, if I was foong a bar graph about the amounts of what was in different jars, the x-axis would have the items in the jars, and the y-axis woukd have the amount of items in the jars
6 0
2 years ago
Read 2 more answers
Which process best describes how you might prepare to apply for a job?
saveliy_v [14]
Take an online course,or maybe do special trainings,practice and study.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
    13·1 answer
  • In the game of economics, producers look to technological improvements to increase which of the following?
    7·2 answers
  • True or false? any webb app can be accessed and run on any computing
    12·1 answer
  • 1.<br> The correct way to use a seat belt is
    8·1 answer
  • PLEASE HELP !!!! WILL UPVOTE
    5·2 answers
  • An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
    13·1 answer
  • Can someone please type a code that makes a house in python and turtle graphics i need help
    9·1 answer
  • In the last two decades, how have cameras evolved?
    12·2 answers
  • What is the most commonly used tab in the Filter dialog box?
    9·2 answers
  • What changes should be made in OSI model(Open System Interconnection).
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!