Reference no: EM132663349
Question 1.
"Predictive versus Adaptive SDLC" Please respond to the following:
Analyze predictive SDLC versus adaptive SDLC. Ascertain at least two advantages and two disadvantages of each approach. Provide a rationale for your response.
Determine whether you would rather be part of a project that used predictive SDLC or adaptive SDLC. Justify your response.
Question 2.
"Personal Computers and Networks" Please respond to the following:
From the e-Activity, determine whether you prefer a laptop or desktop.
Elaborate on the features that you would want your desktop or laptop to offer, and provide an explanation of why you would want such features.
Imagine that you are moving into a new house and need to consider the home network that you will use. Outline the main considerations that you need to take into account when evaluating your networking options. Examine the major types of networks and hardware available in terms of range, speed, security, reliability, and price. Determine the network that you would implement and the hardware that you would need.
Question 3.
Imagine you work for a company that has a large network with thousands of people accessing it, often one server may not be enough to process website access, file shares, and on. To help combat the problem of your network crawling to a halt, there are some features available that can help avoid this scenario.
What are some things you've learned about Network Load Balancing that can help spread your infrastructure's needs to more than one computer? Can you find an example of a company that uses it or perhaps seen it at your job? Note:
You can search the web for some thoughts on this, just explain what you read and include a web link to the resource you found.
If you were responsible for maintaining a critical website for a business, could load balancing be used to help make sure it is always available? What did you learn from your reading about this?
Question 4:
Identify at least two of the ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified?
Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?