Explain how you will manage and monitor the network

Assignment Help Computer Networking
Reference no: EM133069621

ICTNWK546 Manage Network Security

TASK 1 - Network Security Plan

REPORT
Make a Network Security Planning, including:

a. Description
i. Based on the network diagram given above, give a description of the existing network and current security status

b. Network Assets
i. List the network assets based on the diagram above

c. Risk Management Plan (Minimum 10 Threats)

d. Security Policy
i. Network Security Policy (1 paragraph each)
1. Acceptable Use Policy
2. Email and Communications Activities
3. Antivirus Policy
4. Identity Policy
5. Password Policy
6. Encryption Policy
7. Remote Access Policy
ii. Current Security Technologies Inventory (1 paragraph each)
iii. Important Digital Assets (1 paragraph)
iv. Security Breach (1 paragraph)
v. Current and Future Needs (1 paragraph)

e. Proposed Implementation of Security
i. For 3 mitigation strategy from part C, give an explanation of the technology you are going to implement in the network (1 paragraph for each explanation)

f. Incident Reporting Process

g. Revised Network Designs
i. Change the network design given and add all the security measures based on part E

h. Analysis Methods
i. Explain how you will manage and monitor the network (what tools you are going to use)

i. Testing Procedure
i. Give an explanation on how you are going to test each implementation in Part E

j. Sign-off document

Question 1. What is a Phishing attack?

Question 2. Describe one network security threat mitigation technique

Question 3. What is Threat Modelling?

Question 4. What IPsec protocol provides confidentiality for the payload of data packets?
Group of answer choices

(a) ISAKMP

(b) ESP

(c) AH

(d) IKE

Question 5. What type of attack might a hacker use to feed a client false information about the identity of a server?
(a) DNS Poisoning
(b) Replay
(c) Smurf
(d) Bluejackin

Question 6. A trap for hackers.

Group of answer choices

(a) firewall

(b) spoofing

(c) Honeypot

(d) Honey net

Question 7. A comprehensive security product that includes protection against multiple threats. A product typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package.
Group of answer choices

(a) Secure Content Management (SCM)

(b) Intrusion detection systems (IDS)

(c) Network Access Protection (NAP)

(d) Unified Threat Management (UTM)

Question 8. A solution designed to detect unauthorized user activities, attacks, and network compromises.
Group of answer choices

(a) Secure Content Management (SCM)

(b) Intrusion prevention systems (IPS)

(c) Intrusion detection systems (IDS)

(d) Unified Threat Management (UTM)

Question 9 occurs when an attacker is able to intercept a DNS request and respond to the request before the DNS server is able to.

Group of answer choices

(a) Spoofing

(b) DNS spoofing

(c) DNS poisoning

(d) Honeypot

Question 10. Which of the following contains the primary goals and objectives of security?

Group of answer choices

(a) A network's border perimeter

(b) The CIA Triad

(c) A stand-alone system

(d) The Internet

Question 11. Vulnerabilities and risks are evaluated based on their threats against which of the following?

Group of answer choices

(a) One or more of the CIA Triad principles

(b) Data usefulness

(c) Due care

(d) Extent of liability

Question 12. Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects?

Group of answer choices

(a) Identification

(b) Availability

(c) Encryption

(d) Layering

Question 13. What is the primary goal of change management?

Group of answer choices

(a) Maintaining documentation

(b) Keeping users informed of changes

(c) Allowing rollback of failed changes

(d) Preventing security compromises

Question 14. What is the primary objective of data classification schemes?

Group of answer choices

(a) To control access to objects for authorized subjects

(b) To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity

(c) To establish a transaction trail for auditing accountability

(d) To manipulate access controls to provide for the most efficient means to grant or restrict functionality

Question 15. Which of the following is typically not a characteristic considered when classifying data?

Group of answer choices

(a) Value

(b) Size of object

(c) Useful lifetime

(d) National security implications

Question 16. What are the two common data classification schemes?

Group of answer choices

(a) Military and private sector

(b) Personal and government

(c) Private sector and unrestricted sector

(d) Classified and unclassified

Question 17. Which of the following is the lowest military data classification for classified data?

Group of answer choices

(a) Sensitive

(b) Secret

(c) Sensitive but unclassified

(d) Private

Question 18. Which commercial business/private sector data classification is used to control information about individuals within an organization?

Group of answer choices

(a) Confidential

(b) Private

(c) Sensitive

(d) Proprietary

Question 19. Data classifications are used to focus security controls over all but which of the following?

Group of answer choices

(a) Storage

(b) Processing

(c) Layering

(d) Transfer

Question 20. What is the biggest computer security threat in most environments?

Question 21. What would a root security policy include?

Question 22. Research and discuss Unified threat management (UTM) as a tool for managing network security.

Attachment:- Manage Network Security.rar

Reference no: EM133069621

Questions Cloud

Firm times interest earned ratio : In the past year, TVG had revenues of $3.01 million, cost of goods sold of $2.51 million, and depreciation expense of $154,580
Explain the appraisal and title insurance certificate : Betty and Mark Harris are refinancing their home to take advantage of falling mortgage rates. Their current rate is 7.50 percent on a 30-year conventional mortg
Are you driven by intrinsic or extrinsic motivation : What motivates you? Are you driven by intrinsic or extrinsic motivation? What examples might you provide to illustrate this type of motivation?
How many shares would she own afterward : An investor owns some shares in General Refrigeration & Cooling. The company recently underwent a 5 for 2 stock split. If the shares were trading at $50 jus
Explain how you will manage and monitor the network : Change the network design given and add all the security measures based on part E and Explain how you will manage and monitor the network
Estimated required rate of return : Woidtke Manufacturing's stock currently sells for $21 a share. The stock just paid a dividend of $2.40 a share (i.e., D0 = $2.40), and the dividend is expected
Read about successful system implementation : Read about successful system implementation and then answer questions based on your understanding of the concepts.
Determining the value of the stock-simpkins corporation : Simpkins Corporation does not pay any dividends because it is expanding rapidly and needs to retain all of its earnings. However, investors expect Simpkins to b
Firm resource portfolio effectively : How do strategic leaders manage their firm's resource portfolio effectively to exploit its core competencies and leverage its human capital and social capital

Reviews

Write a Review

Computer Networking Questions & Answers

  Technology related to client-dominant local area network

What technology and cost-of-use issues are related with a client- dominant local area network? Think about what happens as the network grows in size and users are storing and retrieving vast amounts of data.

  Install windows server 2012 domain controller

Installation and promotion of your Server to Domain Controller is finished - Record the server status at the time you have done everything

  Kind of media use to connect corporate wan to the internet

What type of media would you recommend using to connect the buildings and why? What kind of media should the company request from its ISP for connecting the corporate WAN to the Internet?

  What is value in the identification field and the ttl field

What is the value in the Identification field and the TTL field - How many fragments were created from the original datagram?

  Define a computer virus

Anti-virus software is used to keep your computer free from viruses. Define a computer virus.

  Explain the general trend and trends within two subsets

Choose, at least, three areas and explain the general trend and trends within two subsets of the area over the last three years.

  Capture the traffic between a domain client and its server

Using a network sniffer, capture the traffic between a domain client and its server during the logon process. Determine if the username and password are encrypted during this process.

  Benefits associated with high broadband access connections

Research on the benefits associated with high broadband access connections? What do users like most about higher connection speeds and how does it improve

  Discuss the characteristics of vlans

VLANs are a common element in business communications and mobile connectivity. Identify and discuss the characteristics of VLANs and why they are important to.

  Calculate the efficiency of transmission at data link layer

Calculate the efficiency of transmission at the data link layer. Assume no options for the IP header and use Ethernet at the data link layer.

  Discuss any form of physical access control

Discuss any form of physical access control, and reference a time when you have used this form of physical access control to provide security to an information asset.

  Technology today threaten our privacy

Does the technology today threaten our privacy?It is hardly new to speak that the Internet presents a grave danger to information privacy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd