CMIT 495 CMIT495 Week 1 Discussion 1 Flashcards

1
Q

CMIT 495 CMIT495 Week 1 Discussion 2

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-1-discussion-2/

CMIT 495 CMIT495 Week 1 Discussion 2

Current Trends and Projects in Computer Networks and Cybersecurity
Discuss the difference between business requirements and design requirements in network upgrading. Please give four examples of each.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CMIT 495 CMIT495 Week 2 Discussion 1

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-2-discussion-1/

CMIT 495 CMIT495 Week 2 Discussion 1
Current Trends and Projects in Computer Networks and Cybersecurity
How can you tell when you have a good design? Describe in two paragraphs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CMIT 495 CMIT495 Week 2 Discussion 2

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-2-discussion-2/

CMIT 495 CMIT495 Week 2 Discussion 2
Current Trends and Projects in Computer Networks and Cybersecurity
List and describe four most important criteria for selecting internetwork devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CMIT 495 CMIT495 Week 3 Discussion 1 Security Plan and Policy

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-3-discussion-1-security-plan-and-policy/

CMIT 495 CMIT495 Week 3 Discussion 1 Security Plan and Policy
Current Trends and Projects in Computer Networks and Cybersecurity
What is the difference between a security plan and a security policy? How these do relates to each other?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CMIT 495 CMIT495 Week 3 Discussion 2 Trade Off for Security

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-3-discussion-2-trade-off-for-security/

CMIT 495 CMIT495 Week 3 Discussion 2 Trade Off for Security
Current Trends and Projects in Computer Networks and Cybersecurity
Network design requires give-and-take to achieve business goals. What four trade offs would need to be made to achieve maximum security of the network?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CMIT 495 CMIT495 Week 4 Discussion 1

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-4-discussion-1/

CMIT 495 CMIT495 Week 4 Discussion 1
Current Trends and Projects in Computer Networks and Cybersecurity
From the list below, pick the four most significant attacks you will consider in protecting the WWTC network security design. Create High Level Security policies and describe mitigation technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CMIT 495 CMIT495 Week 4 Discussion 2

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-4-discussion-2/

CMIT 495 CMIT495 Week 4 Discussion 2
Current Trends and Projects in Computer Networks and Cybersecurity
Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting in severe damage. Write two or three paragraphs about what you found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CMIT 495 CMIT495 Week 5 Discussion 1

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-5-discussion-1/

CMIT 495 CMIT495 Week 5 Discussion 1
Current Trends and Projects in Computer Networks and Cybersecurity
What are some factors or requirements when designing an Active Directory Infrastructure? How do you gather the requirements for the design? Please explain in approximately in two paragraphs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CMIT 495 CMIT495 Week 5 Discussion 2

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-5-discussion-2/

CMIT 495 CMIT495 Week 5 Discussion 2
Current Trends and Projects in Computer Networks and Cybersecurity
How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CMIT 495 CMIT495 Week 6 Discussion 1

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-6-discussion-1/

CMIT 495 CMIT495 Week 6 Discussion 1
Current Trends and Projects in Computer Networks and Cybersecurity
You are the administrator for a mid-sized company that uses Windows 2003 and Windows Server 2008 domain controllers. Your plan is eventually upgrade all domain controllers to Windows Server 2012. The five sites you have are not fully routed and therefore there have been some problems with regard to replicating Active Directory data. You know your budget will not allow you to add additional links or purchase additional equipment. What can you do to improve the efficiency of replications within in your network?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CMIT 495 CMIT495 Week 6 Discussion 2

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-6-discussion-2/

CMIT 495 CMIT495 Week 6 Discussion 2
Current Trends and Projects in Computer Networks and Cybersecurity
All the new designs for the 2011 model year have been approved from the design department, and these files need to be moved to a new domain in the prototyping division. To make the active directory more intuitive, all designs are stored in folders under the control of the Designers Organizational Unit. Permission for most of the designs are set at the OU level, although some files also have individual user permissions set. When you move the designs to the prototyping division, they will be stored in the Prototyping Organizational Unit. All the prototype workers have permission for the Prototyping Organizational Unit and must be able to access all the designs immediately after the move is made. You move the files and check one to make sure the files inherited permissions of the destination OU. All appears to be well with the move, so you turn of your cell phone and go to lunch, confident in the fact that permissions were inherited.
Q: Why can’t the prototyping department open all of the newly files?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CMIT 495 CMIT495 Week 7 Discussion 1

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-7-discussion-1/

CMIT 495 CMIT495 Week 7 Discussion 1
Current Trends and Projects in Computer Networks and Cybersecurity
Do you have enough information to create an implementation plan of AAP. If NOT, how you are going to proceed?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CMIT 495 CMIT495 Week 7 Discussion 2

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-week-7-discussion-2/

CMIT 495 CMIT495 Week 7 Discussion 2
Current Trends and Projects in Computer Networks and Cybersecurity
Research and describe in one paragraph criterias of good implementation plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CMIT 495 CMIT495 WWTC Design Requirements

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-wwtc-design-requirements/

CMIT 495 CMIT495 WWTC Design Requirements

Introduction
The World-Wide Trading Company (WWTC) is an online broker firm that is headquartered in Hong Kong and employs around 9,000 people around the world. WWTC has decided to open a new office in New York and has leased office space on Wall Street. WWTC requires that this new office space be implemented with a state of the art network in order to meet its business goals. As with most businesses, WWTC wants to increase revenue while simultaneously reducing cost. The following is a holistic description of the business and design requirements needed to implement a network that will enable WWTC to be successful in their new branch in New York.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CMIT 495 CMIT495 WWTC LAN and VoIP Design

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-wwtc-lan-and-voip-design/

CMIT 495 CMIT495 WWTC LAN and VoIP Design

Table of Contents
Table of Contents…………………………………………………………………………………1
Introduction……………………………………………………………………………………….2
WWTC Equipment List………………………………………………………………………….2
WWTC Device Naming Convention…………………………………………………………….3
Hierarchical IP Scheme and VLAN…………………………………………………………….4
Network Link IP Addresses……………………………………………………………………..5
High Level Network Diagram………………………………………………………….………..7
Wireless Network Design…………………………………………………………………….….8
VoIP Network Design…………………………………………………………………………..10
Conclusion………………………………………………………………………………………12
References……………………………………………………………………………………….13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CMIT 495 CMIT495 WWTC Project Implementation Plan

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-wwtc-project-implementation-plan/

CMIT 495 CMIT495 WWTC Project Implementation Plan

Table of Contents
Table of Contents…………………………………………………………………………………1
Introduction………………………………………………………………………..……………..2
Project Contacts List…………………………………………………………………………….3
LAN Implementation…………………………………………………………………………….3
Router Configuration………………………………………………………………………7
Switch Configuration……………………………………………………………………..9
Security Implementation……………………………………………………………………….11
Firewall Configuration……………………………………………………………………12
VPN Configuration………………………………………………………………………13
Access Control List (ACL) Configuration……………………………………………….13
Security Technologies……………………………………………………………………14
Active Directory Implementation ……………………………………………………………..15
Install AD DS Role………………………………………………………………………17
DHCP and DNS Configuration………………………………………………………….18
AD Policies and Features…………………………………………………………………19
Active Directory Group Formation………………………………………………………23
Active Directory GPO Implementation………………………………………………….24
Project Milestone Timeline…………………………………………………………………….26
References………….……………………………………………………………………………27

17
Q

CMIT 495 CMIT495 WWTC Security Policies and Security Design

A

BUY HERE⬊
https://www.homeworkmade.com/cmit-495-cmit495-wwtc-security-policies-and-security-design/

CMIT 495 CMIT495 WWTC Security Policies and Security Design

Table of Contents
Table of Contents………………………………………………………………………………..1
Introduction…………………………………………………………………………………….2
Business Needs………………………………………………………………………………….2
Security Policies…………………………………………………………………………………4
Acceptable Use Policy……………………………………………………………………4
Classified Network Usage Policy………………………………………………………..5
Network Access Policy…………………………………………………………………..6
VPN Policy………………………………………………………………………………..7

Remote Access Policy…………………………………………………………………….8
Encryption Policy…………………………………………………………………………9
Physical Security Policy…………………………………………………………………10
Wireless Policy…………………………………………………………………………..11
Email Policy………………………………………………………………………………12
Removable Media Policy…………………………………………………………………13
Privacy Policy……………………………………………………………………………14
Password Policy………………………………………………………………………….15
Asset Security……………………………………………………………………………………16
Security Design…………………………………………………………………………………17
Security Architecture/Diagram………………………………………………………………..20
Conclusion………………………………………………………………………………………22
References……………………………………………………………………………………….23