Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home

Exercise 01: You must select One correct answer and justify your answer 1. Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario. a. A network-based firewall b. An HIDS c. A host-based firewall d. A proxy server 2. Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won’t receive any more legal notices due to IP address tracking. 1Which of the following methods will you use in this scenario? a. Proxy server 1:. Firewall c. IDS d. IPS
在这里插入图片描述
在这里插入图片描述
在这里插入图片描述
Answer & Explanation(course hero问答解锁由留学作业帮www.homeworkhelp.cc整理编辑)
Verified
Solved by verified expert
Hello

Good day

I hope this answer will help you!

Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario.

a. A network-based firewall

Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won’t receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario.

a. Proxy Server

Fred works as the network administrator at Globecomm Communication. The HR team at Globecomm has come up with a new working policy for the employees. This policy allows the employees to freely work at any time of the day as long as they submit the work within 24 hours. Keeping this policy in view, Fred has to work on strengthening the security of the network by adding additional authentication restrictions. Analyze which of the following Fred should do in this scenario.

c. Specify that user accounts may log on only from certain workstations or certain areas of the network

As a network administrator, Murphy wants to add additional layers of security to prevent hackers from penetrating the network. In order to achieve this, he plans on adding additional authentication restrictions that might strengthen network security. Analyze which of the following he should do in this context.

a. Set a limit on consecutive login attempts

Why is security important in design?

Security is important in design because it prevents errors from occurring in the first place. System mistakes can be prevented from the start if a developer adds security elements as a design criterion. “Software engineers, on the other hand, work in a very different approach since they work through standards.”

How do you secure your network design?

Protecting client data and information, keeping shared data secure, guaranteeing reliable access and network performance, and protecting against cyber attacks all require network security. A well-designed network security solution lowers operating costs and protects businesses from severe losses caused by data breaches or other security incidents. Having legitimate access to systems, apps, and data allows businesses to run smoothly and provide services and goods to customers.

How do you manage your network switch?

One of the keys to guaranteeing seamless network performance for employees and end-users is properly building and operating your network switch infrastructure, which is a critical task given how important maintaining high customer satisfaction is.

Reference

https://www.t-systems.com/en/perspectives/security/architecture/security-by-design-554956

https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/

https://solutionsreview.com/network-monitoring/how-to-properly-implement-and-manage-network-switches/

Have a great day!

Step-by-step explanation
Network-based firewalls are security devices that are used to prevent or limit illegal access to private networks connected to the Internet, particularly intranets. Firewall policies define the only traffic allowed on the network; any other traffic seeking to connect is blocked.

A proxy server is a computer or router that acts as a conduit between a client and a server. It is one of the techniques used to establish a firewall that helps prevent an intruder from invading a private network. A proxy server acts on behalf of the user.

Specify that user accounts may log on only from certain workstations or certain areas of the network. It is necessary to set up user accounts in any organization where more than one person has access to a computer or network in order to give individuals access to their own files, programs, email accounts, choice of internet browser (where personal choice is permitted), and history while restricting unauthorized access.

Set a limit on consecutive login attempts The hacker may believe they already know your password, or they may create a script to guess it. In that scenario, you should limit the number of login attempts. If a user enters the wrong password more than the given number of times, the user will be locked out. They’ll be kept out for a set amount of time. From your admin panel, you can change the settings.

Network security is critical for both personal and business networks. Most homes with high-speed internet have one or more wireless routers, which can be hacked if not adequately secured. Data loss, theft, and sabotage can all be reduced with a good network security solution. In addition to network design and ang managing network switches where it can help with the business.

Thank you!

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值