network administration

Although VPNs are relatively secure by nature, endpoints are not. Data entering or leaving the VPN is at risk. An end-user computer could be infected by malicious code that can traverse the VPN link into the company LAN. Answer the following question(s): Consider employees who work from home and use personally owned computers to access … Read more

network administration

Assume you are a network administrator. Your internal network has application servers that are accessed by inbound traffic from the Internet. You are considering several strategies. The strategy you select should provide significant control over user access. You must also ensure that all data passing into the internal network is properly evaluated before access is … Read more

diss 4 data

What is a data type? Describe the relationship between a field and a data type. What are some rules for selecting appropriate data types for fields when designing tables in Access?

network security layers

Deny by default/allow by exception assumes that all traffic is potentially malicious or at least unwanted or unauthorized. Everything is prohibited by default. As benign, desired, and authorized traffic is identified, an exception rule grants it access to the network. Allow by default/deny by exception assumes that most traffic is benign. Everything is allowed by … Read more

network security layers

Data backups are extremely important. Data ups should be kept off site and secure. Research a backup solution, datacenter or cloud based, and explain the available options, cost if possible, advantages and disadvantages, and if this is for personal or corporate use. 

network security layers

A best practice is to thoroughly document the lifespan of a firewall. A firewall implementation procedure should prescribe the systematic process to install and configure a firewall properly. Anytime the firewall is modified, the documentation should be updated accordingly. Answer the following question(s): Assuming you would rarely need to reinstall a firewall, why do you … Read more