Explain what is network control

Assignment Help Computer Networking
Reference no: EM133182460

ICTNWK423 Manage Network and Data Integrity - Australia

Network Management

Deliverables
Your document must include
1. Identifying user access control issues
a. Describe what is user control issues, examples (3 of them) and how to solve it

2. Using appropriate tools to conduct audit on system assets
a. What tools can you use to conduct audit on system assets? (recommendation: SolarWinds - do not download and use it)
b. Explain how to use it and show screenshot

3. Implementing and test antivirus solution
a. Download and install an antivirus software and do the EICAR test on it
b. You need to provide a step by step screenshot how download, install and test. For each screenshot, you will need to provide a brief description what you are doing in the screenshot

4. Employing systems to negate environmental threats
a. Describe what is environmental threats (1 paragraph)
b. Give an example (3 of them) (e.g. fire, floods, etc) - how it will affect the system
c. For each of the example, explain how to prevent it

5. Demonstrating features of data backup, restore and system roll back
a. Create a Windows Server 2012 VM, create a file on it, do a backup of the Windows Server, then delete that file you created, then restore the backup and check if the file came back
b. You need to provide a step by step screenshot how to create the VM, create the file, backup, delete the file, restoration and show the restored file. For each screenshot, you will need to provide a brief description what you are doing in the screenshot

6. Performing network monitoring using a variety of current standard tools
a. Download and install Wireshark and explain how to use it
b. Provide screenshot with your explanation

7. Adding network controls according to network and data integrity policies
a. Explain what is network control
b. Explain what is network and data integrity policies
c. How network control and network and data integrity policies relate?

8. Audit Check List
a. Use 4 Phones Case Study Document and their policies to fill out the audit checklist
b. In findings, reply to the question with "Yes" or "No"
c. If you say "Yes" then you should say "Where" you found it, then in Compliance column you can say "Compliant"
d. If you say "No" then in Compliance column you should say "How" to fix this issue

9. Referencing
a. The Referencing requirements have changed

 

Reference no: EM133182460

Questions Cloud

Describe krispy kreme target market : Describe Krispy Kreme's target market in detail by using demographics, psychographics, geography, lifestyle, or whatever segmentations is appropriate
Create a virtual machine with windows server 2012 : Create a virtual machine with Windows Server 2012 and In your conclusion include any problems you may include and thetrouble shooting process
How many shares of perma-power stock will an investor have : In March, stockholders of Perma-Power approved a 3-for-2 stock split. After the split, how many shares of Perma-Power stock will an investor have
What type of data-gathering incentives work : Discuss your background in surveys, both from a personal and professional standpoint. What type of data-gathering incentives work,
Explain what is network control : Provide a step by step screenshot how to create the VM, create the file, backup, delete the file, restoration and show the restored file
Compute unit cost on an absorption-cost basis : The firm expects to produce 30,000 Orbs during the period. The firm expects to sell 25,000 Orbs during the period. Compute unit cost on an absorption-cost basis
Discuss the nature of stock as investment : Discuss the nature of stock as an investment. Do most stockholders play large roles in the management of the firms in which they invest?
Should wanda drop the replicator product line : Question - Drop Product Line Decision - You work for Wanda Maximoff Corporation. Should Wanda drop the Replicator product line
Examine ethical behavior : Examine ethical behavior within firms in relation to financial management.

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss the managing the cisco iso files

Discuss the Managing the Cisco ISO Files. How do you think you'll manage this important activity when your get on the job?

  Identify which of these technologies is predominant

In your own words, define client/server and cloud computing. Compare and contrast the two technologies, and provide examples to support your discussion.

  What are two reasons for developing lans

Define local area network.- What are the distinguishing features of a LAN?-  What are two reasons for developing LANs?

  Router information protocol

Question 1: What is the purpose of a routing protocol? Question 2: What is a distance-vector routing protocol?Question 3: What are the advantages and disadvantages of distance-vector protocols?

  Forecasting network bandwidth requirements

Write a 3- to 4-page paper on two tools that are available: One for forecasting network bandwidth requirements and One for monitoring network traffic

  Explain move of ethernet from lan technology to man

Explain the move of Ethernet from LAN technology to MAN and Wan technology. Explain what has made this possible? Additionally, explain the social significance of this move.

  A range of software in different departments

Dox.com uses a range of software in different departments within their organisation (e) Describe one area of health and safety regulations, relating to using computers at work, that Dox.com should consider.

  The text companion website

Watch the "Zappos" video at the text Companion website (your access code packaged with the textbook). What are five important points, or "take aways" that you learned from watching the video?

  Explain and plan server deployments and images

Explain and plan server deployments and images. Compare and contrast deployment strategies among different application servers and server roles.

  Discuss about the virtual private networks

Examine the various types of encryptions and choose the one that you would recommend that your organization use.

  How far is it feasible and possible to use neural networks

How far is it feasible and possible to use neural networks to recognize handwritten digits? Can the same logic and functionality can be extended to recognize handwritten alphabets?

  Prerequisite information for modules

STAGE 2 - XML/XQueryConstruct XML representations for the following. Express your design using a diagram and/or a schema.1. Composition of courses, i.e. a list of the modules that make up a course. You may assume that the composition of a course does..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd