Develop a strategy to ensure this compatibility by using

Assignment Help Computer Networking
Reference no: EM13463186

Imagine you have been hired as a network technology consultant for a small business. The owner of the business, Sally Chu, has asked you to provide assistance in setting up local users on a Windows 7 workgroup network. She also wants you to provide the highest level of security for her network.

Write a two to three (2-3) page paper in which you analyze and solve the following issues:

  • Sally wants all six (6) of her administrative staff members to have the same computer-access privileges. She wants them to be able to run applications and use network printers, but not be able to make any accidental changes that can adversely affect their computers.
  • List and explain the steps you would take to provide the most-efficient method of creating user accounts for these employees.
  • Sally wants to be able to provide a high level of authentication for her network's users, so she is asking for a dual authentication process. She has asked you to perform research in this manner by providing two (2) dual authentication methods.
  • Explain two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password XXXXX network access.

Discuss the advantages and disadvantages of using both the methods you've chosen.

Sally has asked you to make security modification to Internet Explorer. You need to ensure all Web-based applications run in protected mode except those that exist on the local intranet since these applications need to write to specific disk space that protected mode prohibits writing to.

Develop a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Note: The graphically depicted solution is not included in the required page length.

Explain how the firm's employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats.

In keeping with the need for strong security on the network, you need to ensure all the clients' computers are provided with the latest updates. Sally has asked you to provide these updates in the most-efficient and cost-effective manner possible and there should be little drag on the network. Remember, your network does not have Active Directory installed.

  1. Describe the update distribution method you would choose and why.
  2. Explain how you would plan the distribution of updates on the network.

Reference no: EM13463186

Questions Cloud

Describe potential risks to the information and the related : write a 1000- to 1500-word paper on at least three major information security threats that a specific organization you
The discussion board db is part of the core of online : the discussion board db is part of the core of online learning. classroom discussion in an online environment requires
Evaluate the online crm system of your bank what are the : part 1answer the module review questions listed below. these questions were chosen to demonstrate your understanding
Evaluation of benefits and pitfalls of competition in : one of the trends marking the continuing transformation of the u.s. health care industry is the dramatic increase in
Develop a strategy to ensure this compatibility by using : imagine you have been hired as a network technology consultant for a small business. the owner of the business sally
Assume that you are serving in the role of director of data : imagine that you are serving in the role of director of data center operations for your company which is currently
There are many different research published to discuss the : there are many different research published to discuss the benefit and side-effect of surrounding ourselves with all
You are a respected and tenured it professor and you also : you are a respected and tenured it professor and you also manage the university computer operations that consist of a
A student enrolls into a programme and the student may : bounix is a higher learning institution that runs several academic programmes. each programme comprises a set of units.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd