find the three questions attatched

User Generated

QeOrna

Business Finance

Description

you should answer the the questions according to the book (Guide to Networks) here is the the book link https://drive.google.com/open?id=1O8rPf72zBJeN-iBl... all question should be answers well it is very important work.

I will send you the book if you wish

Unformatted Attachment Preview

CS 4445 Assignment Questions (5, 6, and 7) Requirements: Student answers must be the work of the individual student without any assistance. These questions will require the student to apply the text concepts to a handson or practical application of the concepts. The answers will be graded on technical accuracy and completeness and not on grammar or format errors. The answers can be hand written or put into any text document format and submitted to me either by email or in person by due date. 5 (Chapters 7 and 8 topics) 1. You have been hired to configure a church’s network and its members to access securely the church network from their homes. Describe in detail all the protocols and configurations/equipment you will need to accomplish this. 2. You have been hired by the church to configure their wireless network to authenticate users before access to the 3 Wireless access points using the single Windows Domain Controller as the authentication server. Describe in detail all the protocols and configurations/equipment you will need to accomplish this. 3. Describe actions and configurations you should recommend to highly secure the church’s network and computers based on topics discussed in Chapter 8. 6 (Chapters 9 and 10 topics) 1. Describe concepts and services of network management that can be implemented by you in your home network. 2. Describe united communications (voice and data) that you may have in your home network or how to establish it in your network. Describe performance issues that may occur and techniques to address them. 3. Describe the naming and addressing services in your network. 4. Describe how you can implement virtualization and VLANS in your home network assuming you have the capability to implement them on your network devices. 7 (Chapters 11 and 12 topics) 1. Describe the wired and wireless WAN technologies and topologies in your home network. 2. Describe the different Internet of Things in your home network and methods and procedures and methods to secure them. 3. Describe procedures for change management you should implement. 4. Describe proper forensics procedures to establish in your network.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

I look forward working with you. good bye

Surname 1
Student’s Name
Instructor
Course
Date
INFORMATION TECHNOLOGY
Question 5
1. Protocols and configurations/equipment in the church network configuration
You need to specify how the members can connect to the network from their homes and
which ports they must use. Set up a server which is capable of connecting all the members from
their homes remotely based on the use of a preshared key, specific address and also specific
ports.The server should also be able to block any connection by which a member has tried to
access the network with an incorrect username or a wrong password and thus lock out attackers.
Set up a specific remote connection which can be given to the users to connect to the church
network.this reduces the support cost

and also it ensures that the members follow your

connection methods and protocols
2. Describe in detail all the protocols and configurations/equipment you will need to
accomplish this.
3. The actions and configurations I would recommend too highly secure the church’s network
and computers based on topics discussed in Chapter 8 is Use of intrusion detection and
prevention (IDS) software on the server to monitor the network and also to notify when there is a
suspicious activity. Use of firewalls the firewalls acts as a filter and between networks and
therefore monitor the network from the inside. Use of SIEM Security Information an Event
Management this can be used to evaluate data significantly for specific events that require

1

Surname 2
attention from IT specialists. Use of logon delay this may include time of the day where some
users can o...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags