Description
Help me with networking notes.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really helpful material, saved me a great deal of time.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of the Cumberlands Information Systems for Business and Beyond Essay
Information Systems for Business and Beyond Questions:Chapter 7 - study questions 1-10, Exercise 2Chapter 8 - study questi ...
University of the Cumberlands Information Systems for Business and Beyond Essay
Information Systems for Business and Beyond Questions:Chapter 7 - study questions 1-10, Exercise 2Chapter 8 - study questions 1-10, Exercise 2Information Technology and Organizational Learning Assignment:Chapter 6 – Review the section on knowledge creation, culture, and strategy. Explain how balance scorecards impact knowledge creation, culture, and strategy. Why are these important concepts to understand within an organization?The above submission should be two pages in length (one page for each chapter) and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.Textbook:https://drive.google.com/drive/folders/1rZKEStzk5J...Requirements: two pages length.
Access project
You work for All Around Outside Maintenance, an outdoor maintenance company, and have decided to create an Access database ...
Access project
You work for All Around Outside Maintenance, an outdoor maintenance company, and have decided to create an Access database to make it easier to keep track of business information. In this project, you will create and update tables, import data, and create queries, forms, and reports. Create a new table in Datasheet View with the following options:
University of the Cumberlands Big Data Visualization Tools R vs Python Essay
Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Pytho ...
University of the Cumberlands Big Data Visualization Tools R vs Python Essay
Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
Harvard University Automobile Research Firm Statistical Analysis
Option #1: Statistical Analysis for an Automobile Research FirmYour organization, a consumer automobile research firm, wis ...
Harvard University Automobile Research Firm Statistical Analysis
Option #1: Statistical Analysis for an Automobile Research FirmYour organization, a consumer automobile research firm, wishes to analyze data from a study of fuel economy among the major automobile models to determine how the variables in the data set correlate with fuel economy. You are tasked with developing a better understanding of the variables in the CARS data set. Management wants you to explore this data set to determine if the data is suitable for use in the next phase of their upcoming analytics project.You are required to conduct two analyses for this assignment.Statistical AnalysisUse SAS University Edition to conduct these statistical tasks:Summary statistics:Use MSRP, Invoice, MPG-City, and MPG-Highway as your analysis variables.Use Make as your classification variable.Distribution analysis:Use MSRP, Invoice, MPG-City, and MPG-Highway as your analysis variables.Note:Statistical tasks are located under Tasks and Utilities > Tasks > Statistics.The data set can be found in Libraries > SASHELP > CARS.Cluster AnalysisConduct the following cluster analysis task:Cluster variables:Determine which variables, if any, appropriately cluster the variables to account for variability.Limit your analysis to 10 clusters.Submit an analysis of each of the variables used (MSRP, Invoice, MPG-City, and MPG-Highway). Include any tables, histograms, or scatterplot graphs necessary to support your analysis. Also, based on the cluster variables analysis, which variables, if any, can function as cluster variables? Provide tables, histograms, and other graphs to support your conclusion.The final analysis report must meet the following requirements:Be 4-6 pages in length, not including the cover and references pages.Follow the CSU-Global Guide to Writing & APA (Links to an external site.). Your paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusionBe clearly and well written using excellent grammar and style techniques. Be concise and logical. You are being graded, in part, on the quality of your writing. If you need assistance with your writing style, you can find many writing resources in the CSU-Global Writing Center (Links to an external site.).Be supported with at least three peer-reviewed, scholarly references, and one citation from the course textbooks. You may also include references from credible sources in print and from the Internet. The CSU-Global Library (Links to an external site.) is a great place to find these resources.Refer to the Critical Thinking Assignment rubric in the Module 6 folder for more information on the expectations for this assignment.Option #2: Analysis of Earthquake Research for an Emergency Assistance OrganizationYour company, an emergency assistance organization, wishes to analyze data from a study of earthquakes around the globe to determine if the longitude and latitude are accurate variables to justify more emergency services in certain locations. You are tasked with developing a better understanding of the variables in the QUAKES data set. Management wants you to explore this data set to determine if the data is suitable for use in the next phase of their upcoming analytics project.You are required to conduct two analyses for this assignment.Statistical AnalysisUse SAS University Edition to conduct these statistical tasks:Summary statistics:Use Longitude, Latitude, Depth, and Magnitude as your analysis variables.Distribution analysis:Use Longitude, Latitude, Depth, and Magnitude as your analysis variables.Note:Statistical tasks are located under Tasks and Utilities > Tasks > Statistics.The data set can be found in Libraries > SASHELP > QUAKES.Cluster AnalysisConduct the following cluster analysis task:Cluster variables:Determine if Longitude and Latitude are viable candidates for cluster variables.Limit your analysis to 10 clusters.The final analysis report must meet the following requirements:Be 4-6 pages in length, not including the cover and references pages.Follow the CSU-Global Guide to Writing & APA (Links to an external site.). Your paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.Be clearly and well written using excellent grammar and style techniques. Be concise and logical. You are being graded, in part, on the quality of your writing. If you need assistance with your writing style, you can find many writing resources in the CSU-Global Writing Center (Links to an external site.).Supported with at least three peer-reviewed, scholarly references, and one citation from the course textbooks. You may also include references from credible sources in print and from the Internet. The CSU-Global Library (Links to an external site.) is a great place to find these resources.
Similar Content
CSIA 310 UMGC Sifers Grayson Cybercrimes Security Posture Company Discussion
Hello, here are the instructions. Thank you.You are approaching the end of your time supporting Sifers-Grayson. Your team...
Machine Learning Techniques and General It to Impact Organization Goals Essay
Analise how you would apply and what have you learned in your speciality area (General IT, Block chain, Cybersecurity, or ...
Project Requirements part 2 A. Identify a List of Potential Users
I have done the first part of the project which is the proposal " it is attached" what you have to do is:In the previous p...
Computer science. Creating a small network
Help me understand this? Where should I start?You have inherited a network design, and need to implement it ASAP. It...
SEU Multimedia Systems Discussion
Questions to solve in the attached file.The solution is in the same file and is sent again.Please solve it without matchin...
Incident Response Plan
Complete an incident response plan Incident response plan (IR plan) A plan that identifies the actions an organization can...
Walmart Retail System.edited
Currently, Walmart utilizes the Retail Link 2.0 that allows Walmart to integrate its high inventory from 100,000 suppliers...
Application Security
Cyberattacks have been on the rise, and for the case of Boeing Commercial Airplane, the attack by the virus that resembles...
No Specific Question
During a PowerPoint presentation understanding the audience is of great importance. Through understanding, an individual p...
Related Tags
Book Guides
Freakonomics
by Stephen J. Dubner and Steven D. Levitt
The Hobbit
by J. R. R. Tolkien
The Remains Of The Day
by Kazuo Ishiguro
Of Mice and Men
by John Steinbeck
Shattered - Inside Hillary Clintons Doomed Campaign
by Amie Parnes and Jonathan Allen
The Tipping Point
by Malcolm Gladwell
The Two Towers
by J. R. R. Tolkien
The Hunger Games
by Suzanne Collins
Dead Poets Society
by Nancy Horowitz Kleinbaum
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of the Cumberlands Information Systems for Business and Beyond Essay
Information Systems for Business and Beyond Questions:Chapter 7 - study questions 1-10, Exercise 2Chapter 8 - study questi ...
University of the Cumberlands Information Systems for Business and Beyond Essay
Information Systems for Business and Beyond Questions:Chapter 7 - study questions 1-10, Exercise 2Chapter 8 - study questions 1-10, Exercise 2Information Technology and Organizational Learning Assignment:Chapter 6 – Review the section on knowledge creation, culture, and strategy. Explain how balance scorecards impact knowledge creation, culture, and strategy. Why are these important concepts to understand within an organization?The above submission should be two pages in length (one page for each chapter) and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.Textbook:https://drive.google.com/drive/folders/1rZKEStzk5J...Requirements: two pages length.
Access project
You work for All Around Outside Maintenance, an outdoor maintenance company, and have decided to create an Access database ...
Access project
You work for All Around Outside Maintenance, an outdoor maintenance company, and have decided to create an Access database to make it easier to keep track of business information. In this project, you will create and update tables, import data, and create queries, forms, and reports. Create a new table in Datasheet View with the following options:
University of the Cumberlands Big Data Visualization Tools R vs Python Essay
Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Pytho ...
University of the Cumberlands Big Data Visualization Tools R vs Python Essay
Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
Harvard University Automobile Research Firm Statistical Analysis
Option #1: Statistical Analysis for an Automobile Research FirmYour organization, a consumer automobile research firm, wis ...
Harvard University Automobile Research Firm Statistical Analysis
Option #1: Statistical Analysis for an Automobile Research FirmYour organization, a consumer automobile research firm, wishes to analyze data from a study of fuel economy among the major automobile models to determine how the variables in the data set correlate with fuel economy. You are tasked with developing a better understanding of the variables in the CARS data set. Management wants you to explore this data set to determine if the data is suitable for use in the next phase of their upcoming analytics project.You are required to conduct two analyses for this assignment.Statistical AnalysisUse SAS University Edition to conduct these statistical tasks:Summary statistics:Use MSRP, Invoice, MPG-City, and MPG-Highway as your analysis variables.Use Make as your classification variable.Distribution analysis:Use MSRP, Invoice, MPG-City, and MPG-Highway as your analysis variables.Note:Statistical tasks are located under Tasks and Utilities > Tasks > Statistics.The data set can be found in Libraries > SASHELP > CARS.Cluster AnalysisConduct the following cluster analysis task:Cluster variables:Determine which variables, if any, appropriately cluster the variables to account for variability.Limit your analysis to 10 clusters.Submit an analysis of each of the variables used (MSRP, Invoice, MPG-City, and MPG-Highway). Include any tables, histograms, or scatterplot graphs necessary to support your analysis. Also, based on the cluster variables analysis, which variables, if any, can function as cluster variables? Provide tables, histograms, and other graphs to support your conclusion.The final analysis report must meet the following requirements:Be 4-6 pages in length, not including the cover and references pages.Follow the CSU-Global Guide to Writing & APA (Links to an external site.). Your paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusionBe clearly and well written using excellent grammar and style techniques. Be concise and logical. You are being graded, in part, on the quality of your writing. If you need assistance with your writing style, you can find many writing resources in the CSU-Global Writing Center (Links to an external site.).Be supported with at least three peer-reviewed, scholarly references, and one citation from the course textbooks. You may also include references from credible sources in print and from the Internet. The CSU-Global Library (Links to an external site.) is a great place to find these resources.Refer to the Critical Thinking Assignment rubric in the Module 6 folder for more information on the expectations for this assignment.Option #2: Analysis of Earthquake Research for an Emergency Assistance OrganizationYour company, an emergency assistance organization, wishes to analyze data from a study of earthquakes around the globe to determine if the longitude and latitude are accurate variables to justify more emergency services in certain locations. You are tasked with developing a better understanding of the variables in the QUAKES data set. Management wants you to explore this data set to determine if the data is suitable for use in the next phase of their upcoming analytics project.You are required to conduct two analyses for this assignment.Statistical AnalysisUse SAS University Edition to conduct these statistical tasks:Summary statistics:Use Longitude, Latitude, Depth, and Magnitude as your analysis variables.Distribution analysis:Use Longitude, Latitude, Depth, and Magnitude as your analysis variables.Note:Statistical tasks are located under Tasks and Utilities > Tasks > Statistics.The data set can be found in Libraries > SASHELP > QUAKES.Cluster AnalysisConduct the following cluster analysis task:Cluster variables:Determine if Longitude and Latitude are viable candidates for cluster variables.Limit your analysis to 10 clusters.The final analysis report must meet the following requirements:Be 4-6 pages in length, not including the cover and references pages.Follow the CSU-Global Guide to Writing & APA (Links to an external site.). Your paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.Be clearly and well written using excellent grammar and style techniques. Be concise and logical. You are being graded, in part, on the quality of your writing. If you need assistance with your writing style, you can find many writing resources in the CSU-Global Writing Center (Links to an external site.).Supported with at least three peer-reviewed, scholarly references, and one citation from the course textbooks. You may also include references from credible sources in print and from the Internet. The CSU-Global Library (Links to an external site.) is a great place to find these resources.
Earn money selling
your Study Documents