Answers are in the books that i will attach. Nonother source required

Anonymous
timer Asked: Dec 13th, 2017
account_balance_wallet $20

Question description

1- this is the book( 4451 - Guide to Network Security & Fundamentals)

CS 4451 Final Exam




Requirements: Student answers must be the work of the individual student without any assistance and will be graded on technical accuracy and completeness and not on grammar or format errors.



The answers can be hand written or put into any text document format and submitted to me either by email or in person by due date (12/14).



I expect that your answer would take you about 3 hours to develop and describe (similar to taking the exam in the classroom with course time limits).



Background:



You have been hired as a IT security consultant by a small jewelry store business in the Dothan area to determine the security of its network and all its componets. The company has both wired and wireless access for its desktop computers, laptops, and cell phones. It also has Internet access and hosts its own web server and DNS server in the network on site. The manager has remote access to the network from home.



Describe all the security considerations and design you would recommend to the business to give it the highest security possible with no cost restrictions in your solutions. State all apprpriate assumptions you are making to help me assess in grading your answer.

Second assignment

CS 4445 Final Exam

this is the book (4445 - Guide to Networks)



Requirements: Student answers must be the work of the individual student without any assistance and will be graded on technical accuracy and completeness and not on grammar or format errors.



The answers can be hand written or put into any text document format and submitted to me either by email or in person by due date (12/14).



I expect that your answer would take you about 3 hours to develop and describe (similar to taking the exam in the classroom with course time limits).



Background:



You have been hired as a network IT consultant by a small bookstore business in the Dothan area to configure a new network and maintain it long term. The company wants both wired and wireless access for its desktop computers, laptops, and cell phones to the Internet. The Business will host its own web server and DNS server in the network on site. The manager wants to be able to access the network from his home.



Describe all the networking componets, design, and their deployment you will recommend to the business with no cost restrictions in your solutions. State all apprpriate assumptions you are making to help me assess in grading your answer.

Tutor Answer

profjorum
School: UT Austin

Since it an exam, i did not include citation.if you need to have them let me to include the book that you provided. In case you you require anything,feel free to contact me any time. good bye

Surname 1

Student’s Name
Instructor
Course
Date
NETWORK
First assignment
The first thing that needs to be considered is the network and components’ security risks.
Risk involves the effect that a loss of data, programs, and processes would have on the network
and its devices. Automatic there are more serious potential consequences, and hence more
attention is needed for security of the network. Different type of organization has different levels
of network security depending on the type of service offered. In general, the network security
must be in a position to data and access to the information from an authorized people.
The business needs to conduct a posture assessment annually to assess its security risk
which is a thorough examination of each aspect of the network and have an idea of how it can be
compromised. Posture assessment should also be done after making significant changes to the
business network. To trade with some customers, a security audit is mandatory to assure the
security of their data and information. Below are the security considerations and design that I
would recommend to the business to give it the highest protection possible.
Network operating system(NOS) security. The design is based on restricting what the
users are authorized to do on a network. The administrator must understand which resources on
the server that all users need to access. The administrator should limit the public rights which

Surname 2

include the privileges to view and execute programs from the servers to create, modify, read,
delete and run files in a shared directory. The ad...

flag Report DMCA
Review

Anonymous
The best tutor out there!!!!

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors