<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>
Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.
It is a security device and purpose to make organization to access or connected to end use of other networks.
Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN
Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers. Keeping network logs is policy driven. So network administrator keeps logs for no. of days.
Some network administration export log and keep as reference.
Once a computer system is appropriately built, secured, and deployed, the process of maintaining security is <u>continuous</u>.
<h3>What is information security?</h3>
Information security is a preventive practice that is used to protect an information system (IS) or computer system from potential theft, attack, damage, or unauthorized access, especially through the use of a body of processes and technology.
As a general rule, once a computer system is appropriately built, secured, and deployed, the process of maintaining security is <u>continuous</u>.
Read more on information security here: brainly.com/question/14286078
#SPJ12
Answer:
You should now be able to give IP addresses to 254 hosts. This works fine if all 150 computers are on a single network. However, your 150 computers are on three separate physical networks. Instead of requesting more address blocks for each network, you divide your network into subnets that enable you to use one block of addresses on multiple physical networks
Explanation:
Incomplete question. Here's the full question:
Which two mandatory options are used to configure a VLAN interface?
A customer wants to set up a VLAN interface for a Layer 2 Ethernet port.
Which two mandatory options are used to configure a VLAN interface? (Choose two.)
A. Virtual router
B. Security zone
C. ARP entries
D. Netflow Profile
Answer:
<u>A. Virtual router</u>
<u>B. Security zone</u>
<u>Explanation:</u>
According to the networking protocol to create a virtual local area network (VLAN) you must:
1. Have a configured Virtual router
2. Create or configure a Layer 2 Security Zones.
Although there are other network requirements to successfully create VLAN but this are the basic ones needed.