Assume you are a Network Administrator in your organisation who has been faced with various network-related issues, and have managed to resolve them effectively.
Discuss any ten (10) Network-related issues and the corresponding troubleshooting steps/ approach that you have adopted to resolve these issues. Use appropriate diagrams, images or screenshots where applicable in order to enhance your explanation.
BranchRouter >> HQRouter
network: 209.165.165.0
Mask: 255.255.255.252
Prefix:?
WAN Segment:
Fill in the appropriate address and prefix information below. The prefix does not need to be the entire network address, but rather just the two-digit number:
Branch WAN interface IP address:_____
HQ WAN interface IP address:___
Prefix (with or without the slash):______
Give a detailed account on the relationship between logical and physical design
Critically analyse the difference between horizontal application software and vertical application
software.
You are an IT consultant, and you are asked to create a new system for a small real estate brokerage firm.
Your only experience is with traditional data and process modelling techniques. This time, you decide to try
an object-oriented approach. How will you begin? How are the tasks different from traditional structured
analysis?
When you save the information the channel you use and the data server you have to consider it also determines the safety of your software.
Firewall vs content filter IDS (With Example)
Read the following scenario and suggest measures that could be taken to improve the security of the computer system.
A Computer Science student has a summer job in the data processing department of a large supermarket.
One lunchtime he is left alone in the office which he shares with several other employees. He sits down at a colleague’s desk and finds that the PC is still logged on. He browses the menu and comes upon a menu to access the product database.
The submenu asks if he would like to Add, Delete, Update or View products. He selects Update and changes the price of several items that he wishes to purchase. Then he leaves the office and goes and makes his purchases, before returning and restoring the database to its original state. How could his actions be discovered?
Indicate, in the correct order, the layers of TCP/IP protocol stack that are implemented on the following network components :
End system (host)
Router
Switch
For a business and enterprise users, network and data security is of utmost concern. To address this, there are a number of precautions that a WLAN user can adopt to prevent a network from hacker attacks, unauthorised access, and coparate espionage. Discuss various security measures /precautions that can be adopted in preventing these attacks.
Encryption to large extent can been adopted to restrict access to data/information only to intended receiver. With the use of well-labeled diagram, discuss various types of encryption and it's operations.