Configure and Document the configuration steps taking screenshot of any Unified Threat Management.
Department Number of Users
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing Team need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
Department Number of Users
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing Team need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
how will you use the knowledge you acquired about managing waste electrical and electronic equipment?
Your report must be structured in the following approach.
Q.2.1.1
Executive summary.
Q.2.1.2
Background (case study’s IT security issues only).
Q.2.1.3
Development of the proposed solution.
Q.2.1.4
The role of the IT risk manager in addressing physical and network risk.
Q.2.1.5
The best methods of combating the network-based attack.
Q.2.1.6
The impact of social engineering when combating network security.
Q.2.1.7
The most appropriate mechanism in implementing network access authentication and authorisation without compromising network security.
Q.2.1.8
The implementation of the best strategy to fight against hacking, hijacking and maintain the online presence.
Q.2.1.9
The most appropriate location and strategy for the DMZ and firewall implementation.
Q.2.1.10
Conclusion.
Configure and Document the configuration steps taking screenshots of any Unified Threat Management.
Design a complete network infrastructure of an organization using Packet Tracer
1. Describe any 10 Core Network Services that will be required in University of Ghana
1.Describe any 50 Port Numbers and their services
Consider a system with 13 dedicated devices of the same type and all jobs currently
running on this system require a maximum of three devices to complete their
execution but they each run for long periods of time with just two devices and
request the remaining one only at the very end of the run. Assume that the job
stream is endless and that your operating system’s device allocation policy is a very
conservative one: No job will be started unless all the required drives have been
allocated to it for the entire duration of its run.
Under what circumstances an additional job would be started ?