Reference no: EM133182460
ICTNWK423 Manage Network and Data Integrity - Australia
Network Management
Deliverables
Your document must include
1. Identifying user access control issues
a. Describe what is user control issues, examples (3 of them) and how to solve it
2. Using appropriate tools to conduct audit on system assets
a. What tools can you use to conduct audit on system assets? (recommendation: SolarWinds - do not download and use it)
b. Explain how to use it and show screenshot
3. Implementing and test antivirus solution
a. Download and install an antivirus software and do the EICAR test on it
b. You need to provide a step by step screenshot how download, install and test. For each screenshot, you will need to provide a brief description what you are doing in the screenshot
4. Employing systems to negate environmental threats
a. Describe what is environmental threats (1 paragraph)
b. Give an example (3 of them) (e.g. fire, floods, etc) - how it will affect the system
c. For each of the example, explain how to prevent it
5. Demonstrating features of data backup, restore and system roll back
a. Create a Windows Server 2012 VM, create a file on it, do a backup of the Windows Server, then delete that file you created, then restore the backup and check if the file came back
b. You need to provide a step by step screenshot how to create the VM, create the file, backup, delete the file, restoration and show the restored file. For each screenshot, you will need to provide a brief description what you are doing in the screenshot
6. Performing network monitoring using a variety of current standard tools
a. Download and install Wireshark and explain how to use it
b. Provide screenshot with your explanation
7. Adding network controls according to network and data integrity policies
a. Explain what is network control
b. Explain what is network and data integrity policies
c. How network control and network and data integrity policies relate?
8. Audit Check List
a. Use 4 Phones Case Study Document and their policies to fill out the audit checklist
b. In findings, reply to the question with "Yes" or "No"
c. If you say "Yes" then you should say "Where" you found it, then in Compliance column you can say "Compliant"
d. If you say "No" then in Compliance column you should say "How" to fix this issue
9. Referencing
a. The Referencing requirements have changed
Describe krispy kreme target market
: Describe Krispy Kreme's target market in detail by using demographics, psychographics, geography, lifestyle, or whatever segmentations is appropriate
|
Create a virtual machine with windows server 2012
: Create a virtual machine with Windows Server 2012 and In your conclusion include any problems you may include and thetrouble shooting process
|
How many shares of perma-power stock will an investor have
: In March, stockholders of Perma-Power approved a 3-for-2 stock split. After the split, how many shares of Perma-Power stock will an investor have
|
What type of data-gathering incentives work
: Discuss your background in surveys, both from a personal and professional standpoint. What type of data-gathering incentives work,
|
Explain what is network control
: Provide a step by step screenshot how to create the VM, create the file, backup, delete the file, restoration and show the restored file
|
Compute unit cost on an absorption-cost basis
: The firm expects to produce 30,000 Orbs during the period. The firm expects to sell 25,000 Orbs during the period. Compute unit cost on an absorption-cost basis
|
Discuss the nature of stock as investment
: Discuss the nature of stock as an investment. Do most stockholders play large roles in the management of the firms in which they invest?
|
Should wanda drop the replicator product line
: Question - Drop Product Line Decision - You work for Wanda Maximoff Corporation. Should Wanda drop the Replicator product line
|
Examine ethical behavior
: Examine ethical behavior within firms in relation to financial management.
|