1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
4 years ago
12

As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The

credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town. The headquarters has the following equipment:
- Ten Windows 7 and ten Windows 10 workstations, connected to a Windows Server 2008 R2 file server - One Windows Server 2008 R2 RRAS server accessed by home workers after hours
-One Windows Server 2008 R2 print server
- One Linux database server
-One Web server for members to check their account balances online
-One firewall where the network connects to the credit union’s ISP via a T3 dedicated link
The east-side office has five Windows 7 workstations, connected to the headquarters office Windows Server 2008 R2 server through a T1 link. At the headquarters, the servers reside in a locked room that admits authorized users with an electronic badge access system. Both locations have numerous security cameras, including cameras in the computer room. The manager also tells you that the credit union has a security policy that all employees are required to read and sign when they become employees. He believes that the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches. In response, create a checklist of items on this network that should be evaluated for security. Sketch a network diagram for the credit union (remember to include connectivity devices necessary for the LAN and WAN connections). Describe any entry points (physical or data transmission related) or situations that constitute potential security risks. In addition, explain how the credit union manager could better train his employees to understand network security.
Computers and Technology
1 answer:
ale4655 [162]4 years ago
8 0

Answer:1987

Explanation:guess

You might be interested in
A raised dot (ú) shows where the enter key was pressed. true or false.
Yakvenalex [24]
False i doesnt  shows anything like this


6 0
4 years ago
Djdjdjdjdjdjdjdjdjjdjdjdjdjdjdjdjdjdjdj
DanielleElmas [232]
Shorty a bad bleep .
7 0
3 years ago
Read 2 more answers
A user informs you that he or she never deletes any files he or she creates. How might this affect the operating system? It will
Juliette [100K]

Answer:

Depending on the amount of files there are, the operating system will run slower because these files take up space on the hard drive, slowing it down.

Explanation:

6 0
3 years ago
In comparing a computer to the human brain, the computer's hardware is like _____ and the computer's software is like _____.
Ne4ueva [31]
This includes application software<span> such </span>as<span> a word processor, which enables a user to perform a task, and system </span>software<span> such </span>as<span> an operating system, which enables other </span>software<span> to run properly, by interfacing with hardware and with other </span>software<span>.
</span>
Computer hardware<span> is the collection of physical parts of </span>a computer system<span>. This includes </span>the computer<span> case, monitor, keyboard, and mouse. It also includes all the parts inside </span>the computer<span> case, such </span>as<span> the hard disk drive, motherboard, video card, and many others. </span>Computer hardware<span> is what you can physically touch.


</span>
8 0
3 years ago
You can perform numbers___on binary
Masja [62]

Answer:

c) arithmetic operations

3 0
3 years ago
Read 2 more answers
Other questions:
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    12·2 answers
  • The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets sho
    14·1 answer
  • Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
    14·1 answer
  • Please Help!
    14·2 answers
  • Type an SQL statement into the Record Source property of the report. The statement should select all fields (*) for employees wi
    5·1 answer
  • Why is it so important to have employees who can critically think?
    7·2 answers
  • linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
    5·1 answer
  • The Review tab in Microsoft Publisher provides two groupings called _____. Proofing and Language Spell Check and Research Proofi
    6·1 answer
  • Analyze the error in the html code :<br><br> HTML
    9·1 answer
  • imagine that you wanted to write a program that asks the user to enter in 5 grade values. the user may or may not enter valid gr
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!