1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
12

As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The

credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town. The headquarters has the following equipment:
- Ten Windows 7 and ten Windows 10 workstations, connected to a Windows Server 2008 R2 file server - One Windows Server 2008 R2 RRAS server accessed by home workers after hours
-One Windows Server 2008 R2 print server
- One Linux database server
-One Web server for members to check their account balances online
-One firewall where the network connects to the credit union’s ISP via a T3 dedicated link
The east-side office has five Windows 7 workstations, connected to the headquarters office Windows Server 2008 R2 server through a T1 link. At the headquarters, the servers reside in a locked room that admits authorized users with an electronic badge access system. Both locations have numerous security cameras, including cameras in the computer room. The manager also tells you that the credit union has a security policy that all employees are required to read and sign when they become employees. He believes that the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches. In response, create a checklist of items on this network that should be evaluated for security. Sketch a network diagram for the credit union (remember to include connectivity devices necessary for the LAN and WAN connections). Describe any entry points (physical or data transmission related) or situations that constitute potential security risks. In addition, explain how the credit union manager could better train his employees to understand network security.
Computers and Technology
1 answer:
ale4655 [162]3 years ago
8 0

Answer:1987

Explanation:guess

You might be interested in
printArray is a function that has two parameters. The first parameter is an array of element type int and the second is an int,
Illusion [34]

Answer:

printArray(inventory, n);

Explanation:

The question doesn't specify in which language this has to be done, here's a generic call then... so if it's aimed at a specific language, some minor adjustments might be needed to respect the proper syntax/structure of that specific language.

Given:

printArray: function name, using 2 parameters.

inventory: array of ints

n : integer, number of items in array inventory

The call to the function would be:

printArray(inventory, n);

7 0
3 years ago
what would be the result of running these two lines of code
MatroZZZ [7]

Answer:

Jog

Explanation:

The variable options is a list containing 5 string values

options = ["ski", "surf", "jog", "bike", "hike"]

Indexing in python starts from 0 ; hence the index values of the list values are :

0 - ski

1 - surf

2 - jog

3 - bike

4 - hike

The statement ;

print(options[2]) means print the string at index 2 in the list named options

The string at index 2 is jog ;

Hence, the string jog is printed.

8 0
3 years ago
Narrate an incident from the experience of a 14 year old girl which brings out the message: " Never leave till tomorrow what you
pogonyaev
Smth called google turbo record United in
7 0
2 years ago
The two types of one-time-password tokens are ______ and ______.
Nutka1998 [239]

Answer:

event based and time based

Explanation:

OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated

5 0
3 years ago
Read 2 more answers
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
Other questions:
  • Which organization publishes a handbook that describes various occupations?
    12·1 answer
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • The _________ in Java is passed by value but ______ is passedby reference.
    5·1 answer
  • The browser on which you are viewing web pages is called the
    13·1 answer
  • A personal computer (pc) or ____ is a small computer system designed to be used by one person at a time.
    12·1 answer
  • .Write a MATLAB script that VECTORIZES (eliminates the loop) the following code. (4points)
    14·1 answer
  • PLS HELP ME!! WILL GIVE BRAINLIEST
    7·2 answers
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
  • Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
    13·1 answer
  • windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!