1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
6

For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro

vide a rationale at the end of the table.
Select from these security controls:

a. Place a firewall between the Internet and your Web server.

b. Place a firewall between your Web server and your internal network.

c. Enforce password complexity.

d. Implement Kerberos authentication for all internal servers.

e. Require encryption for all traffic flowing into and out from the Ken 7 Windows environment.

f. Separate wired and wireless network entry points into separate logical networks.

g. Require all personnel attend a lunch and learn session on updated network security policies.

Security policy statements:

__________ 1. More and more users are using the Ken 7 Windows network to access social media sites during business hours, causing the network to slow down. Users should not use Ken 7 network resources for social media access.

__________ 2. Most Ken 7 personnel own mobile phones and PDAs that can connect to the Internet. Ken 7 network administrators are concerned that personal device access may pose a security threat to Ken 7 network resources. Personal devices must not be allowed to connect to the Ken 7 Windows network.

__________ 3. Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous Web application users should be able to access any protected resources in the Ken 7 infrastructure.

__________ 4. Users who print confidential reports must not be allowed to send reports to unsecured printers.

__________ 5. Passwords should not be words found in the dictionary.
Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
8 0

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

You might be interested in
What stage of software development incorporates planning to help make changes in the project plan based of reviews
larisa86 [58]

Answer:

A

Explanation:

8 0
3 years ago
The =COUNT function calculates what value?
Natalka [10]

c is the anwer of question

4 0
3 years ago
Read 2 more answers
HELP PLLISSSSSSSSSS!!!!!!!!!! its unit test will mark as brainliest
astraxan [27]

Answer:

1. file

2. true:false

3. prioitized

4. drafts

Explanation:

8 0
3 years ago
7. Which computer network is better to use for a computer lab? L.A.N or W.A.N? State why you chose your answer.
Readme [11.4K]

Answer :This is a sort of computer network services that are utilized for giving internet access. Devices like, modems and switch are required by the specialists to build up a WAN. WAN uses layer 2 Ethernet, fiber optics, and others for the connection. 4. Wireless Local Area Network:  ̄へ ̄

Explanation:

7 0
3 years ago
Critical Infrastructure and Key Resources (CIKR) are potential terrorist targets. CIKR might include: Select one: 1. All telecom
Ulleksa [173]

Answer:

The answer is "Every option is right".

Explanation:

In the given question one option is missing, which is defined in the answer section.

The critical infrastructure defines physical and technological networks and services, it is important for the USA, that they would have deteriorating consequences in terms of material or financial protection or human health or security, that's why all option was correct, which can be described as follows:

  • In option 1, It uses a tower for telecom.
  • In option 2, It provides a facility for transmission.
  • In option 3, It is used in the park for provides security.
  • In option 4, It is used in treatment.

5 0
3 years ago
Other questions:
  • Who is the CEO of Quora?
    15·1 answer
  • What command is used to add a reflection or an outline to text
    7·1 answer
  • Ayuda no encuentro la información de estas tres preguntas:
    10·1 answer
  • Select the software which is used to convert audio data to text .
    15·1 answer
  • How to make a website
    15·2 answers
  • Can someone reply me
    11·1 answer
  • WHO WANT P O I N T S.................................................
    9·1 answer
  • Do anyone know how to code like I need someone do a code for me?
    13·1 answer
  • How does a Cloud-first strategy differ from other approaches to Cloud?
    11·1 answer
  • What is the significance of the scientific method?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!