Report on any possible vulnerabilities in configuration

Assignment Help Computer Networking
Reference no: EM13981773

After conducting preliminary security testing on the Alexander Rocco Corporation network, you have identified that the company has seven Web servers. One is a Windows 2000 Server system running 115 5.0. Curt Cavanaugh, the Webmaster and network administrator says the Web server is used only by sales personnel as a front-end to update inventory data on an Oracle database server. He says this procedure needs to be done remotely, and it's convenient for sales personnel to use a Web browser when out of the office. Based on this information, write a one-page report on any possible vulnerabilities in the current configuration of the company's Web server. Use the tools you have learned to search for possible vulnerabilities of 115 5.0. Your report should include any recommendations that might increase Web security.

Reference no: EM13981773

Questions Cloud

How much would your body temperature decrease : Suppose that you drank 16 oz of an ice cold soft drink. If you body were unable to adjust its own temperature, how much would your body temperature decrease?
What is the ear : What is the APR on this loan? What is the EAR?
What is the charge distribution on the sphere : Suppose the conducting spherical shell in the figure below carries a charge of 2.60 nC and that a charge of -2.20 nC is at the center of the sphere. What is the charge distribution on the sphere?
Fidelity select natural resources : Select Natural Resources Portfolio over the life of this fund. The paired data below are the values, in dollars, of the $10,000 invested in the S&P 500, and in the Fidelity Select Natural Resources
Report on any possible vulnerabilities in configuration : Based on this information, write a one-page report on any possible vulnerabilities in the current configuration of the company's Web server. Use the tools you have learned to search for possible vulnerabilities of 115 5.0. Your report should inclu..
Explain the performance management process : Explain the performance management process and how it should be implemented in the organizations.
What is the value of the option to wait : What is the NPV in one year to wait, NPV today for waiting. What is the value of the option to wait?
What is the wave particle duality : What is the wave particle duality? Explain dual nature of electron? Give the significance of DeBroglie's equation and Explain the concept of vapour pressure. Give reason- Liquid ammonia bottle is cooled before opening.
Write report listing possible vulnerabilities of the wlan : Based on this information, write a one-page report listing possible vulnerabilities of the WLAN's current configuration. Your report should include recommendations for improving wireless security

Reviews

Write a Review

Computer Networking Questions & Answers

  Wireless networksconsider a warehouse that is 60m by 30m

wireless networksconsider a warehouse that is 60m by 30m. wireless networking is required so that up to 20 staff

  Securing online transactions-administering an e-commerce.

What are some elements of securing online transactions?,What are some elements of administering an e-commerce site.

  Describe how a proxy server works and what is the benefit

Describe how a proxy server works and what is the benefit of having a proxy server. What are the primary functions of an incident response plan, disaster recovery plan, and business continuity plan. What is the purpose of a business impact analysis

  Compare how state and local governments mirror three

write 500-750 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Computer homework a network that consist of five class c

a network that consist of five class c. networks connected six routers. each network has a single machine on it.

  Your boss has just heard about several me nefarious

your boss has just heard about some nefarious computer activities called ping sweeps and port scans. he wants to know

  Which data hazards added to datapath

Which of data hazards can be prevented if forwarding is added to datapath? For each such hazards, list register number and two instructions involved.

  Explain how each is a backup disaster recovery

Make a case for setting up a single, separate DNS server at each location and explain how each is a backup disaster recovery (DR) for the other

  What resources are available on the internet

What resources are available on the Internet to help system administrators determine how to harden a Windows Server 2008? Windows 7 workstation? (List at least three resources in your response.)

  From the second e-activity decide which you would select to

envision that you are a systems administrator managing five different web servers for your company. each web server

  Explain where ip best solution method

Post note describing an example where IP would be the best solution method. at lease 100 words. Where do we go from here with Operations Research and Management Science?

  Determine and list the ip address ranges

Netstack College has received a grant to wire all of its six buildings for 10/100 Ethernet. Four of the buildings contain classrooms and laboratories and will need to support 250 network connections each. One building is for administration and wil..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd