Question 3
a) I have no need for security management functions because I am using a dedicated and secure management network. Please comment on this statement
AP,5
2
b) Performance and accounting management are similar, in that both are interested in collecting usage data from the network. Describe an important way in which the use of this data and the requirements for its
AN,10
c)A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. What should an
administrator implement to prevent future outbreaks?
Question 2
a) Explain two factors that can be important to the business success of a third-party
management application vendor that potentially has to compete with a network management offering of a network equipment vendor
AP,5
b) Explain the most important reason for using a dedicated management network instead of a shared one?
Assume that you need to manage a network that contains three different types of
devices. To avoid dependence on a particular vendor, you have two suppliers for each
type of device. Explain some of the ways in which management standards are
important in this situation.
c)
AN,10
AP,10
TOTAL[
Question 1
a) A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Explain the protocol needed to be configured on each network device to provide that information in a secure manner AP,5
b) A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which policy should the IT security team implement to help protect the network from attack as a result of this new policy
c)
Explain why a management protocol needed between managers and agents, and why
isn't mere connectivity between them sufficient?
Question 3
a) I have no need for security management functions because I am using a dedicated and secure management network. Please comment on this statement
b) Performance and accounting management are similar, in that both are interested in collecting usage data from the network. Describe an important way in which the use of this data and the requirements for its collection differ.
c)A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. What should an
administrator implement to prevent future outbreaks?
Question 4
a)
As a network administrator, design a network diagram for an organization having six
offices in in a different region making sure that users can access all the organization’s network
b) A technician wants to securely manage several remote network devices. Explain what
should be implemented to securely manage the devices?
c) After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Explain what should the technician perform so that Ann can get back to work as quickly as possible?
• What is deadlock? What is starvation? How do they differ from each other?
) Compare the two policies and then create a policy you believe would be fair to you as a student of RGI. Include guidelines for Internet use during school hours, breaks, use of smartphones, and restrictions for using social media and unauthorized websites
(a) Locate two AUPs, one from the internet (published online) and the second one should be for your institution (Richfield Graduate Institute of Technology?
• Consider a bit streaming scenario for a video where the following values apply:
– The buffer size is 1 MiB
– The low watermark is set at 100KiB
– The high watermark is set at 900KiB
– The incoming data rate is 1Mbps
– The video display rate is 300 Kbps
Assume that the video is playing and that the buffer content has dropped to the low-water mark. The media player sets the controls for data input to begin again.
– Calculate the amount of data that will be input in two seconds to the buffer and the amount of data that will be removed from the buffer in the same period of time.
– Repeat the calculation for 4,6,8,10,12 seconds.
– From this data estimate when the buffer will have filled up to the high water mark.
– Assuming that the incoming transmission is halted at this time, calculate how long it will be before the buffer content has again fallen to the low-water mark level.
Consider a bit streaming scenario for a video where the following values apply: – The buffer size is 1 MiB – The low watermark is set at 100KiB – The high watermark is set at 900KiB – The incoming data rate is 1Mbps – The video display rate is 300 Kbps
Assume that the video is playing and that the buffer content has dropped to the low-water mark. The media player sets the controls for data input to begin again
Consider a bit streaming scenario for a video where the following values apply: – The buffer size is 1 MiB – The low watermark is set at 100KiB – The high watermark is set at 900KiB – The incoming data rate is 1Mbps – The video display rate is 300 Kbps