Audit and monitoring network security purposes

Assignment Help Basic Computer Science
Reference no: EM13935236

Task Instructions In this context, consider Linux environment only. Further assumptions may be required to answer the above questions. So, use appropriate assumptions where needed to support your solutions. You are expected to write between 400-600 words per-question.

All questions are of equal value. Case description:

SIMT Pty Ltd. is a Sydney based private RTO (Registered Training Organisation) that provides to employees and students to access to its internal information system such as: college's online leaning system called Moodle, email system using Sendmail, network storage, and other services that support students learning and teacher delivery course on campus. Staff and students are able to work and retrieve information remotely when needed. Considering the above case and answer the following questions:

Question 1: In scenario, there are 200 students enrolled and starting the course in a week time. What are the best methods to create username and password for college's network login, email address, and Moodle's account for these students to minimise time and accuracy? Provide suitable scripts and screenshots to support for your discussions.

Question 2. Explain and implement method(s) of how to terminate and close student's account and network access privilege when student completed and graduated from college. Provide suitable scripts and screenshots to support for your implementation.

Question 3. To audit and monitoring network security purposes. Discuss methods to verify when and where student logins to the college's online learning and email system. * Please check the attachment for instructor requirements

Reference no: EM13935236

Questions Cloud

Who are the people affected in the situation : As the controller of Breathless Perfume Co., you discover a misstatement that overstated net income in the prior year's financial statements. Who are the people affected in the situation
Replace job role-training manager by organisation developer : Topic: The current job market shows an emerging trend of replacing the job role of ‘Training Manager' with that of ‘Organisation Development Manager'.
What do you mean by negotiation : What do you mean by Negotiation, What are the Negotiation Techniques, What are the outcome of Negotiation Techniques, What are the suggestion for winning a Negotiation.
Design the environment for the system : Develop a design plan and schedule detailing your plans for the next 4 weeks in order to deliver the tasks specified. This should cover what design decisions must be made and who should make them; what tasks must be performed and in what order;
Audit and monitoring network security purposes : Task Instructions In this context, consider Linux environment only. Further assumptions may be required to answer the above questions. So, use appropriate assumptions where needed to support your solutions. You are expected to write between 400-60..
What are some challenges both anticipated and unexpected : What are some challenges (identify three to five), both anticipated and unexpected, when completing the partnership tax return? What solutions can you provide to those challenges?
Fraudulent accounting described affect the current ratio : How did the fraudulent accounting just described affect the current ratio?
Using the concept of incremental analysis : Using the concept of incremental analysis, expand on Nick's response of Why do you want to know?
What key events represent the romantic view of leadership : Go to www.gsk.com, What key events represent the romantic view of leadership and what events describe the external control perspective leadership

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Stack object data structures do not contain code

Stack object data structures do not contain code to throw an exception when a stack.pop() function is called on an empty stack. This is due to the fact that it is easy to establish this exception handing elsewhere. Create a class named SafeStack that..

  Define each term in your own words

Define each term in your own words. Put them in alphabetical order and number them.

  Search and seizure of computers

search and seizure of computers

  Explain what aspects of the system should be evaluated

What aspects of the system do you think should be evaluated. Are those aspects considered in the evaluation. What is the experimental testbed used. What experiments were performed. Details of experimental results. What aspects of the system were n..

  Give remediation recommendation for potential vulnerability

Provide a remediation recommendation for a potential vulnerability found with the use of the "eval" function in a static analysis report.

  What is not a reason to update bios

What is not a reason to update BIOS?What software is protected against viruses and malware?

  Determine the functional dependencies

Using your knowledge of TAL Distributors, determine the functional dependencies that exist in the following table. After determining the functional dependencies, convert this table to an equivalent collection of tables that are in third normal for..

  Analyse the united states of america''s economic recesssion

Analyse the United States of America's economic recesssion oif 2008

  The preferred method of interacting with a computer

Graphical User Interface (GUI) became the preferred method of interacting with a computer system. Beginning with the Xerox-developed GUI in 1970, GUI-based platforms have evolved from the Apple Macintosh to the Microsoft Windows operating syste..

  Top current it issues in higher education

Discuss Five of the top current IT issues in Higher Education

  Advantages of the database approach

What are the advantages of the database approach over the traditional approach to database management? What is a data center, and why are they becoming increasingly important

  Represent valid comments

Java, C#, and C++ all allow use of comments. Which of the following represent(s) valid comments in these three languages

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd