1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
6

For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro

vide a rationale at the end of the table.
Select from these security controls:

a. Place a firewall between the Internet and your Web server.

b. Place a firewall between your Web server and your internal network.

c. Enforce password complexity.

d. Implement Kerberos authentication for all internal servers.

e. Require encryption for all traffic flowing into and out from the Ken 7 Windows environment.

f. Separate wired and wireless network entry points into separate logical networks.

g. Require all personnel attend a lunch and learn session on updated network security policies.

Security policy statements:

__________ 1. More and more users are using the Ken 7 Windows network to access social media sites during business hours, causing the network to slow down. Users should not use Ken 7 network resources for social media access.

__________ 2. Most Ken 7 personnel own mobile phones and PDAs that can connect to the Internet. Ken 7 network administrators are concerned that personal device access may pose a security threat to Ken 7 network resources. Personal devices must not be allowed to connect to the Ken 7 Windows network.

__________ 3. Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous Web application users should be able to access any protected resources in the Ken 7 infrastructure.

__________ 4. Users who print confidential reports must not be allowed to send reports to unsecured printers.

__________ 5. Passwords should not be words found in the dictionary.
Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
8 0

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

You might be interested in
Please help!! will fan and medal
levacccp [35]
So here are the answers that would best complete the given statements above.
1. <span>The standard resolution for graphics on the Web is 72 dpi.
2. </span> The larger the <span>resolution, the larger the file size.
3. </span>An Inline <span>image is an image that appears on a Web page.
4. File </span><span>size, download times, and the number of colors are factors that will help you decide which graphic format you should use.
5. </span> Adobe Photoshop <span>is an image editing program.
6. The IMG tag </span><span>s used to bring an image into a Web site. 
7. The PNG </span><span>format was the most recently developed popular graphic format. </span>
7 0
4 years ago
Read 2 more answers
This device is used to connect sections of large networks?
ryzh [129]
Monster energy boissss
6 0
3 years ago
Read 2 more answers
A teacher at your school is using her district issued laptop to create spreadsheets for her part-time job as a bookkeeper. Which
Alenkasestr [34]

Answer:

The teacher is most likely violating the District Use Policy.

5 0
2 years ago
You can replace a formula with its function so it remains constant. true or false.
kumpel [21]
True/Function. You can replace a formula with its function so it remains constant.
4 0
3 years ago
What is geometric constraint?​
Anit [1.1K]

a geometric constraint relates to other parts of a geometric figure. Geometric constraint defines dimensions of an object in computer aided design or CAD

8 0
3 years ago
Other questions:
  • Motivation is best defined as
    9·2 answers
  • Last semester, Henri bought his textbooks over the Internet and saved a considerable amount of money. Classes start in a few day
    12·2 answers
  • Define a class named ComparableSquare that extends Square (defined above) and implements Comparable. Implement the compareTo met
    7·1 answer
  • Why did Herman Hollerith invent the Tabulating Machine?
    10·1 answer
  • Farm equipment that travels on public roads
    14·2 answers
  • Your digital footprint says a lot about you, but not everything is true or accurate. When you're a high school or college studen
    13·1 answer
  • Discuss the objectives of business 8 marks​
    10·2 answers
  • Answer this pls ASAP
    11·1 answer
  • Could some please answer the question in the pictures? Thank you!! I will also give your brainliest if you give me the right ans
    11·1 answer
  • What are the two different types of dns requests?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!