Language:EN
Pages: 9
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
abbey college australia national provider

Abbey college australia national provider

ASSESSMENT 1

1.1 While working for Netalk, a new IP telephony company, Jessica was in the process of identifying tools to increase network security. She noticed that the current system used methods to create direct connections between end users.

Are there any security risks associated with this type of setup? Explain your answer and what should be done to increase security.

1.2 After submitting his proposal for recommended changes, Anthony meets with the head of security who wants to discuss the topic of creating secure
connections via virtual private network (VPN). After a quick discussion on the overall technology and how it would help, the head of security asks if there are any drawbacks to using a VPN.

Briefly explain how routers and switches are configured, starting with what steps Edward should take in this situation. He’s been given permission to do whatever is necessary for their security.

Switcher enables various computers to connect on a network and routers to communicate between different networks. A router is a networking system routing data packets through a network of

1.4 While looking over XYZ’s security system, Francis is surprised to see they are using hardware that is almost a decade old. According to the network
administrator they have been experiencing a lot of system errors every and are worried that their network is frequently under attack. During his assessment, while looking for various alerts, Francis finds that their network is not under attack, the hardware is just failing.

1.5Continuing from assessment question 1.4, Anthony then meets with the systems engineer to discuss setting up a VPN server in the enterprise network. The systems engineer asks why they can’t just use a third-party VPN instead of setting up a VPN server which would increase costs to the company.

ICTNWK421 Install, configure and test network security
5 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G Version V2.0 Jan 2021

How would Sarah explain what perimeter means when it comes to networking, and why it’s important?

While going through the security documents, Janice begins to look through the recorded incidents and notices there are frequent attacks being made in a similar way which means there must be some issue the security team has been
overlooking. Going over the security set-up she finds that hypertext transfer protocol is still being used by one of the web servers.

What is HTTP and why is it a problem? What should be done to cater for it?

1.9 While going over previous security incidents, Joanna finds cases where certain IP addresses were caught eavesdropping on network communication.

Falsification is described as "manipulating study materials, instruments, or procedures, or altering or omitting data or results in order to provide an inaccurate record of the research."

1.10 Currently the company uses a third-party VPN service, after discussing it with the appropriate personnel Janice decides to implement a VPN server on site, meaning within the company network, but before she can do so she needs to determine the logistics.

in other locations.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Lagan Kumer

PageId: DOCA071773