1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
6

For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro

vide a rationale at the end of the table.
Select from these security controls:

a. Place a firewall between the Internet and your Web server.

b. Place a firewall between your Web server and your internal network.

c. Enforce password complexity.

d. Implement Kerberos authentication for all internal servers.

e. Require encryption for all traffic flowing into and out from the Ken 7 Windows environment.

f. Separate wired and wireless network entry points into separate logical networks.

g. Require all personnel attend a lunch and learn session on updated network security policies.

Security policy statements:

__________ 1. More and more users are using the Ken 7 Windows network to access social media sites during business hours, causing the network to slow down. Users should not use Ken 7 network resources for social media access.

__________ 2. Most Ken 7 personnel own mobile phones and PDAs that can connect to the Internet. Ken 7 network administrators are concerned that personal device access may pose a security threat to Ken 7 network resources. Personal devices must not be allowed to connect to the Ken 7 Windows network.

__________ 3. Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous Web application users should be able to access any protected resources in the Ken 7 infrastructure.

__________ 4. Users who print confidential reports must not be allowed to send reports to unsecured printers.

__________ 5. Passwords should not be words found in the dictionary.
Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
8 0

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

You might be interested in
What is the simplest way to permanently get rid of an unwanted file on the computer
Mrac [35]
Delete it. Also defragmentation may be an option if your computer is running slow.
8 0
4 years ago
Need help with 3.2 lesson practice questions (edhesive)​
Vinvika [58]

Answer:

<h2>Doesn't have a question</h2>

Explanation:

<h2 /><h2>THANK YOUU</h2>
7 0
3 years ago
Create a report showing the Order ID, the name of the company that placed the order, and the first and last name of the associat
8090 [49]

Answer:

/******************************

Both of the queries below will work in SQL Server

Oracle

******************************/

SELECT o.OrderID, c.CompanyName, e.FirstName, e.LastName

FROM Orders o

JOIN Employees e ON (e.EmployeeID = o.EmployeeID)

JOIN Customers c ON (c.CustomerID = o.CustomerID)

WHERE o.ShippedDate > o.RequiredDate AND o.OrderDate > '1-Jan-1998'

ORDER BY c.CompanyName;

/******************************

MySQL

******************************/

SELECT o.OrderID, c.CompanyName, e.FirstName, e.LastName

FROM Orders o

JOIN Employees e ON (e.EmployeeID = o.EmployeeID)

JOIN Customers c ON (c.CustomerID = o.CustomerID)

WHERE o.ShippedDate > o.RequiredDate AND o.OrderDate > '1998-01-01'

ORDER BY c.CompanyName;

8 0
3 years ago
The list of abbreviations, punctuation, symbols, typefaces, and instructional notes that appears at the beginning of the ICD and
Ilia_Sergeevich [38]

Answer: Conventions

Explanation: Convention is the writing activity with the components like punctuation,grammar,symbols,note etc to make the written content understandable and clear. This feature is used because people can understand the meaning of content read by them without initializing it later.

As soon as the reader finishing the reading the information should be clear in his/her mind so that they don't have to figure it out after reading.Convention enhances the value of reading and learning by it's feature .

4 0
3 years ago
Consider the following relation for published books: BOOK (Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher
Ivenika [448]

The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

<u>Explanation:</u>

<u> lGiven the relation </u>

<u>l</u>Book(Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher)

land the FDs

lBook_title . Publisher, Book_type

lBook_type . Listprice

lAuthorname .Author_affil

(a) The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

(b) 2NF decomposition:

lBook0(Book_title, Authorname)

lBook1(Book_title, Publisher, Book_type, Listprice)

lBook2(Authorname, Author_affil)

<u> This decomposition eliminates the partial dependencies. </u>

3NF decomposition:

lBook0(Book_title, Authorname)

lBook1-1(Book_title, Publisher, Book_type)

lBook1-2(Book_type, Listprice)

lBook2(Authorname, Author_affil)

l<u>This decomposition eliminates the transitive dependency of Listprice </u>

8 0
3 years ago
Other questions:
  • You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
    10·1 answer
  • What is the maximum data transfer rate of an ieee 1394a device?
    5·1 answer
  • Using Amdahl’s Law, calculate the speedup gain of an application that has a 60 percent parallel component for (a) two processing
    11·1 answer
  • How can social media be useful for brand awareness ?
    14·1 answer
  • On the Loan worksheet, in cell C9, enter a PMT function to calculate the monthly payment for the Altamonte Springs 2018 faciliti
    6·1 answer
  • Which of the following is an object-oriented prototype-based language? Java Pike REBOL MATLAB
    9·1 answer
  • The most important assistance that a full-featured HTML editor provides is _____.
    14·1 answer
  • Explain why the computer is powerful working tool???​
    7·1 answer
  • Select the correct answer
    5·2 answers
  • Write a function, called valFrequency, that given a list of values as a parameter, counts the frequencies for each value in the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!