Administration or a help desk professional

Assignment Help Basic Computer Science
Reference no: EM131204480

Application Activity 1:

Interview someone at the company of your choice who handles network administration or a help desk professional who handles the administration of any of the operating systems identified in this course. It is important to select an individual that has a functional knowledge of identifying types of cyber-attacks, designing and implementing measures to respond to such an event, and understands different forms of malicious code. While an in-person interview is preferred, you can also conduct this interview by phone or e-mail.

During your interview be sure to inquire as to the individual's job title and daily responsibilities. Also, be sure to discuss the problems that exist with monitoring network activity, to include access controls, cryptography, and identifying malicious code. In addition, note the features of operating systems that typically benefit organizations in terms of security benefits. Lastly, inquire as to the career potential that exists in network security and related fields. Feel free to ask many additional questions, as these questions are given to ensure key areas are identified.

Once you have concluded your interview, gather your data and draft a report detailing the information gained as a result of the interview. Your report should be a minimum of 5 pages excluding the title page and references. There must be a minimum of 5 peer-reviewed sources included.

Reference no: EM131204480

Questions Cloud

Prepare a research paper about grandma vs research : Prepare a research paper about Grandma vs. Research. Overview some of the specific research methods described in the video to study happiness. Which seemed the most effective to you and why?
Provides three examples of each component of shell model : Completes the SHEL(L) worksheet - Provides at least three examples of each component of the SHEL(L) model.- identify the example of that SHEL(L) model component.
What if the optimal size is between 3 and 4 : If the optimal club size is between 4 and 5, what is the smallest population beyond which eminency is always achieved? What if the optimal size is between 3 and 4?
Compute the standard deviation : Compute the expected return of stock a and compute the standard deviation - compute the expected return ?B. Compute the standard deviation ?C. Presuming the stock returns are normally distributed, what do these results indicate?
Administration or a help desk professional : Interview someone at the company of your choice who handles network administration or a help desk professional who handles the administration of any of the operating systems identified in this course.
What is the membership level that maximizes total utility : Consider a club where the utility function (incorporating the charge) of a member is U = a + bn -cn2. Find the optimal membership of the club. What is the membership level that maximizes the total utility of the club? Contrast the two levels and e..
Identify how the activity enhances physical development : Describe the activity in some detail (provide more than just the name of the activity). Describe the theory and/or research which supports the use of this class or activity. Identify how the activity enhances physical development.
Develop branding strategies for existing and new products : Develop branding strategies for existing and new products. Develop pricing strategies and distribution channels for products. Analyze integrated marketing communications and its relationship to advertising strategy.
Describe what is meant by the term synoptic gospels : Explain at least three reasons why there are so many divisions / denominations in the Christian religion. Explain what is meant by the term "synoptic gospels", and discuss why this term is important for Christians when reading the Bible.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many code words have exactly three 0''s

How many code words have exactly three 0's?

  Explain vulnerability in the system

How would you respond if Goli came to you describing a vulnerability in your system and offering to help fix it--What would incline you to hire her? What would disincline you from doing so?

  Total order and the sum of all orders

Commission Amount e) The customer will make five orders, display the average of the total order and the sum of all orders. You must use at least two methods. Write the output to a file named "Order.txt" The program should also display "Thanks for ..

  The rigor of a methodology be useful

The rigor of a methodology be useful

  When are all the global states of level l?l constructed

When are all the global states of level lνl constructed?

  User can input an odd number in the range from 1 - 25

this pattern (9 rows), modify your program so that your user can input an odd number in the range from 1 - 25 for the number of rows in the diamond.

  Discuss the choice of programming language

CSS 422 . Discuss the choice of programming language and its relation to architecture, and the design decision in one of these six categories: If you were the software architect of an online election system for your county, how would you define the t..

  Explain how self-arp might help with this problem

Explain how "self-ARP" (querying the network on startup for one's own IP address) might help with this problem.

  Technology in home-workplace has negative impact on women

What technology in the home and workplace has a negative impact on women, if any; and (b) do women roles still remain largely associated with the home and domestic chores.

  Prolog sudoku

Write a Prolog program to solve the 6 by 6 Sudoku puzzle distributed in class. Do not use a solution downloaded from the Internet or elsewhere. Write your own. It should be designed along these lines

  Intrusion detection system on a virtual machine

How do you Install SNORT Intrusion detection system on a virtual machine using Mint and configure it to create a simple rule which generates an alert each time a specific website is visited from that virtual machine (e.g. www.yahoo.com).

  Using a pld, develop an i/o port decoder

Using a PLD, develop an I/O port decoder that generates the following high-bank I/O strobes: 300DH, 300BH, 00B6H, and 00EEH.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd