1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
6

For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro

vide a rationale at the end of the table.
Select from these security controls:

a. Place a firewall between the Internet and your Web server.

b. Place a firewall between your Web server and your internal network.

c. Enforce password complexity.

d. Implement Kerberos authentication for all internal servers.

e. Require encryption for all traffic flowing into and out from the Ken 7 Windows environment.

f. Separate wired and wireless network entry points into separate logical networks.

g. Require all personnel attend a lunch and learn session on updated network security policies.

Security policy statements:

__________ 1. More and more users are using the Ken 7 Windows network to access social media sites during business hours, causing the network to slow down. Users should not use Ken 7 network resources for social media access.

__________ 2. Most Ken 7 personnel own mobile phones and PDAs that can connect to the Internet. Ken 7 network administrators are concerned that personal device access may pose a security threat to Ken 7 network resources. Personal devices must not be allowed to connect to the Ken 7 Windows network.

__________ 3. Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous Web application users should be able to access any protected resources in the Ken 7 infrastructure.

__________ 4. Users who print confidential reports must not be allowed to send reports to unsecured printers.

__________ 5. Passwords should not be words found in the dictionary.
Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
8 0

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

You might be interested in
Which of the following explains why computers can be used in account payable ?
Nikolay [14]

Answer:

Explanation:

Computer equipment is an active and our passive increase, this means that a company bought hardware, the company must pay for that equipment.

For example:

A college bought new hardware to update their computer lab, the account explanation would be.

                                                    Debit    Credit

computer equipment                  $1000

    account payable - company               $1000

5 0
3 years ago
What are some cowboy ethics??
lys-0071 [83]

Answer:

giv meh a min plsssss

Explanation:

4 0
3 years ago
According to the text, the judicious use of elements such as bullets, numbers, boldface, italics, and capitalization in document
kaheart [24]

Answer:

Facilitating interactivity.

Providing visual variety.

Emphasizing key information.

Explanation:

The judicious use of these elements helps the author in various different ways. These characters facilitate the interaction of the reader with the text by making it easier for him to understand the best way to proceed with the reading. Moreover, they provide visual variety, which makes information easier to process for the reader. Finally, these characters also emphasize key information, helping with reading comprehension.

6 0
3 years ago
In a data dictionary, ____ is the maximum number of characters for an alphabetic or character data element or the maximum number
const2013 [10]

Answer:

length

Explanation:

<h2><u>Fill in the blanks </u></h2>

In a data dictionary, <u>length</u>  is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element.

4 0
3 years ago
Select all actions that a database may perform
siniylev [52]
3 create a data form 
5 validate the data...

4 0
3 years ago
Other questions:
  • What are the challenges of photographing at night? Why did the photographer “paint” the waterfall with the flashlight?
    9·1 answer
  • How would I CAST this variable to a STRING?<br> teeth = 32
    9·1 answer
  • You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
    11·1 answer
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • You have received a "no boot device found" notification upon booting your system. what does this mean, and what can you do to tr
    12·1 answer
  • Which audio format is used to create chiptunes?
    12·2 answers
  • Word templates include pre-made flyers which may be edited and saved only if permission is obtained from the Microsoft Office te
    11·1 answer
  • Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b.
    14·1 answer
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
  • Select the correct answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!