1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
4 years ago
12

As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The

credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town. The headquarters has the following equipment:
- Ten Windows 7 and ten Windows 10 workstations, connected to a Windows Server 2008 R2 file server - One Windows Server 2008 R2 RRAS server accessed by home workers after hours
-One Windows Server 2008 R2 print server
- One Linux database server
-One Web server for members to check their account balances online
-One firewall where the network connects to the credit union’s ISP via a T3 dedicated link
The east-side office has five Windows 7 workstations, connected to the headquarters office Windows Server 2008 R2 server through a T1 link. At the headquarters, the servers reside in a locked room that admits authorized users with an electronic badge access system. Both locations have numerous security cameras, including cameras in the computer room. The manager also tells you that the credit union has a security policy that all employees are required to read and sign when they become employees. He believes that the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches. In response, create a checklist of items on this network that should be evaluated for security. Sketch a network diagram for the credit union (remember to include connectivity devices necessary for the LAN and WAN connections). Describe any entry points (physical or data transmission related) or situations that constitute potential security risks. In addition, explain how the credit union manager could better train his employees to understand network security.
Computers and Technology
1 answer:
ale4655 [162]4 years ago
8 0

Answer:1987

Explanation:guess

You might be interested in
Value or power of a network grows exponentially as a function of the number of network members. this is known as ________ law.
mel-nik [20]
Value or power of a network grows exponentially as a function of the number of network members. this is known as Metcalfe's law. According to this law <span>the value (the power) of a </span>telecommunications network<span> is </span>proportional to the square of the number of connected users of the system (network members). Metcalfe's Law <span>characterizes many of the </span>network effects<span> of communication technologies and networks such as the </span>Internet<span>, </span>social networking<span> and the </span>World Wide Web<span>.</span> 
6 0
3 years ago
Which of the following best describes a hacktivist? Select one: a. An individual who attempts to destroy the infrastructure comp
brilliants [131]

Answer: (B) An individual who hacks computers or Web sites in an attempt to promote a political ideology

Explanation:

 Hacktivist is the defined as an individual that basically hacks the various types of web sites and computer system for promoting the various political ideologies. The hacktivists is the method which include the DDOS attacks (Distributed denial of services).

It basically causes various website and the email with the congestion of traffic with the computer virus and by the data stealing. The denial of services attacks typically considered federal crime and illegal in united state.  

4 0
4 years ago
PLS HURRY!
Debora [2.8K]

Answer:

D. All of the options listed are correct.

Explanation:

A macro, in excel sheet, is an action or series of action that repeats the keystrokes or mouse actions as many times as one wants. To view macro, shortcut key is to Pres Alt+F8; to delete, one needs to select the macro one wants to delete and press Delete button.

The another way to view macro is to go to the Developer tab, and select the Macro option in Code group. And, then select macro need to delete, and press Delete button.

Another shortcut is to press Alt+F11, and click  on Tools tab, click on Macros and then select macro need to be deleted, and press Delete.

So, all the options stated above are correct.

Therefore, option D is correct answer.

8 0
3 years ago
Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?
NemiM [27]

Answer:

Check below for the answer and explanations

Explanation:

Digital media coordinators are professionals that create and manage digital contents. They create and manage websites, blogs, social media platforms, e-commerce sites, etc.

To be a practitioner in this field, Claire needs a first degree in any of digital media, social sciences, communications, computer science and similar courses.

She needs to have a good knowledge of computer software, a high reasoning skill and a laudable communications skill.

5 0
3 years ago
Assume that the int variables i, j and n have been declared , and n has been initialized . write code that causes a "triangle" o
SIZIF [17.4K]

Here you go,

class Program

   {

       static void Main(string[] args)

       {          

          int n,i,j;

          Console.Write("Enter size: ");

          n = Convert.ToInt32(Console.ReadLine());

          for (i = 1; i <= n; i++)

          {

              for (j = 1; j <= i; j++)

              {

                  System.Console.Write("*");

              }

              System.Console.Write("\n");

          }          

           Console.ReadLine();

       }

   }

5 0
3 years ago
Other questions:
  • What is the definition of the components that motherboards, ssds, processors, and cases are part of?
    10·1 answer
  • Make a java program to enter a two-digit integer and determine if both digits are prime
    6·1 answer
  • What does API stand for
    7·2 answers
  • What computer worm was used to sabatoge iran's nuclear program?
    11·1 answer
  • The term "exception propagation" means:
    5·1 answer
  • Does Congress have a role in determining FAA regulations? If so, what is it?
    11·1 answer
  • "Why learning how to type is so important.
    7·1 answer
  • Select the correct answer.
    12·2 answers
  • U $ er Ideas for R 0 B 1 0 X?
    12·2 answers
  • Need help ASAP.<br> I am so lost.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!