Computers and Technology, 05.10.2021 04:00 cwsmith8026
For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business office. Here are the required elements for the network:
The office has 20 workers with 17 administrative staff and three managers who need higher-level system access.
The 17 administrative workers all need to be able to connect to printers, and all need to be able to check company email though a dedicated POP3 setup, but they do not need any other external internet access. The three managers need to have some way to access the internet occasionally.
The LAN will be set up through a DSL/cable modem.
Everyone needs to be able to access a database of customer information that has credit card data and order histories, etc.
One manager needs to be able to access the system remotely.
Create a document describing, precisely step-by-step, what actions you would take to set up this secure LAN and VLAN, including discussions of:
How you will configure the firewalls for the software and hardware. Include your “rules”/protocols in this section.
What security settings you would apply to switches.
How you would configure and secure wireless devices.
How you would secure the overall LAN and DSL/cable modem connection.
How you would secure any servers related to this setup.
What tools you would recommend for monitoring ports and network traffic, according to your own research. You must go beyond simply listing tools and defend your choices.
What IDS and IPS you will include, again according to your own research.
What you will include to accommodate the manager who needs remote access.
To receive full credit for this assignment, you must be explicit in your steps. For example, rather than saying “change the router’s password,” give specifics: “create a new password for the router using XYZ criteria so that the password is secure.”
You may conduct any amount of independent research to improve your plan, but all of the basic elements were covered in the unit itself (except for specific port monitoring applications and IDS/IDP).
Answers: 2
Computers and Technology, 22.06.2019 19:20
Consider the following code snippet: #ifndef cashregister_h#define cashregister_hconst double max_balance = 6000000.0; class cashregister{public: cashregister(); cashregister(double new_balance); void set_balance(double new_balance); double get_balance() const; private: double balance[12]; }; double get_monthly_balance(cashregister bk, int month); #endifwhich of the following is correct? a)the header file is correct as given.b)the definition of max_balance should be removed since header files should not contain constants.c)the definition of cashregister should be removed since header files should not contain class definitions.d)the body of the get_monthly_balance function should be added to the header file.
Answers: 1
Computers and Technology, 24.06.2019 13:30
Which type of excel chart should be used to track students’ progress on test grades? line column bar pie
Answers: 2
Computers and Technology, 24.06.2019 14:30
Alison is having a hard time at work because hee inbox is flooded with emails every day. some of these emails are unsolicited. some of other she don’t need. which action should she take to better manager her emails?
Answers: 1
Computers and Technology, 24.06.2019 17:00
What are some examples of what can be changed through options available in the font dialog box? check all that apply. font family italicizing bolding pasting drop shadow cutting character spacing special symbols
Answers: 2
For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business offi...
English, 20.07.2019 21:30
Mathematics, 20.07.2019 21:30
Business, 20.07.2019 21:30
Mathematics, 20.07.2019 21:30
History, 20.07.2019 21:30
History, 20.07.2019 21:30
Mathematics, 20.07.2019 21:30
Computers and Technology, 20.07.2019 21:30