Explain how you will manage and monitor the network

Assignment Help Computer Networking
Reference no: EM133069621

ICTNWK546 Manage Network Security

TASK 1 - Network Security Plan

REPORT
Make a Network Security Planning, including:

a. Description
i. Based on the network diagram given above, give a description of the existing network and current security status

b. Network Assets
i. List the network assets based on the diagram above

c. Risk Management Plan (Minimum 10 Threats)

d. Security Policy
i. Network Security Policy (1 paragraph each)
1. Acceptable Use Policy
2. Email and Communications Activities
3. Antivirus Policy
4. Identity Policy
5. Password Policy
6. Encryption Policy
7. Remote Access Policy
ii. Current Security Technologies Inventory (1 paragraph each)
iii. Important Digital Assets (1 paragraph)
iv. Security Breach (1 paragraph)
v. Current and Future Needs (1 paragraph)

e. Proposed Implementation of Security
i. For 3 mitigation strategy from part C, give an explanation of the technology you are going to implement in the network (1 paragraph for each explanation)

f. Incident Reporting Process

g. Revised Network Designs
i. Change the network design given and add all the security measures based on part E

h. Analysis Methods
i. Explain how you will manage and monitor the network (what tools you are going to use)

i. Testing Procedure
i. Give an explanation on how you are going to test each implementation in Part E

j. Sign-off document

Question 1. What is a Phishing attack?

Question 2. Describe one network security threat mitigation technique

Question 3. What is Threat Modelling?

Question 4. What IPsec protocol provides confidentiality for the payload of data packets?
Group of answer choices

(a) ISAKMP

(b) ESP

(c) AH

(d) IKE

Question 5. What type of attack might a hacker use to feed a client false information about the identity of a server?
(a) DNS Poisoning
(b) Replay
(c) Smurf
(d) Bluejackin

Question 6. A trap for hackers.

Group of answer choices

(a) firewall

(b) spoofing

(c) Honeypot

(d) Honey net

Question 7. A comprehensive security product that includes protection against multiple threats. A product typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package.
Group of answer choices

(a) Secure Content Management (SCM)

(b) Intrusion detection systems (IDS)

(c) Network Access Protection (NAP)

(d) Unified Threat Management (UTM)

Question 8. A solution designed to detect unauthorized user activities, attacks, and network compromises.
Group of answer choices

(a) Secure Content Management (SCM)

(b) Intrusion prevention systems (IPS)

(c) Intrusion detection systems (IDS)

(d) Unified Threat Management (UTM)

Question 9 occurs when an attacker is able to intercept a DNS request and respond to the request before the DNS server is able to.

Group of answer choices

(a) Spoofing

(b) DNS spoofing

(c) DNS poisoning

(d) Honeypot

Question 10. Which of the following contains the primary goals and objectives of security?

Group of answer choices

(a) A network's border perimeter

(b) The CIA Triad

(c) A stand-alone system

(d) The Internet

Question 11. Vulnerabilities and risks are evaluated based on their threats against which of the following?

Group of answer choices

(a) One or more of the CIA Triad principles

(b) Data usefulness

(c) Due care

(d) Extent of liability

Question 12. Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects?

Group of answer choices

(a) Identification

(b) Availability

(c) Encryption

(d) Layering

Question 13. What is the primary goal of change management?

Group of answer choices

(a) Maintaining documentation

(b) Keeping users informed of changes

(c) Allowing rollback of failed changes

(d) Preventing security compromises

Question 14. What is the primary objective of data classification schemes?

Group of answer choices

(a) To control access to objects for authorized subjects

(b) To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity

(c) To establish a transaction trail for auditing accountability

(d) To manipulate access controls to provide for the most efficient means to grant or restrict functionality

Question 15. Which of the following is typically not a characteristic considered when classifying data?

Group of answer choices

(a) Value

(b) Size of object

(c) Useful lifetime

(d) National security implications

Question 16. What are the two common data classification schemes?

Group of answer choices

(a) Military and private sector

(b) Personal and government

(c) Private sector and unrestricted sector

(d) Classified and unclassified

Question 17. Which of the following is the lowest military data classification for classified data?

Group of answer choices

(a) Sensitive

(b) Secret

(c) Sensitive but unclassified

(d) Private

Question 18. Which commercial business/private sector data classification is used to control information about individuals within an organization?

Group of answer choices

(a) Confidential

(b) Private

(c) Sensitive

(d) Proprietary

Question 19. Data classifications are used to focus security controls over all but which of the following?

Group of answer choices

(a) Storage

(b) Processing

(c) Layering

(d) Transfer

Question 20. What is the biggest computer security threat in most environments?

Question 21. What would a root security policy include?

Question 22. Research and discuss Unified threat management (UTM) as a tool for managing network security.

Attachment:- Manage Network Security.rar

Reference no: EM133069621

Questions Cloud

Firm times interest earned ratio : In the past year, TVG had revenues of $3.01 million, cost of goods sold of $2.51 million, and depreciation expense of $154,580
Explain the appraisal and title insurance certificate : Betty and Mark Harris are refinancing their home to take advantage of falling mortgage rates. Their current rate is 7.50 percent on a 30-year conventional mortg
Are you driven by intrinsic or extrinsic motivation : What motivates you? Are you driven by intrinsic or extrinsic motivation? What examples might you provide to illustrate this type of motivation?
How many shares would she own afterward : An investor owns some shares in General Refrigeration & Cooling. The company recently underwent a 5 for 2 stock split. If the shares were trading at $50 jus
Explain how you will manage and monitor the network : Change the network design given and add all the security measures based on part E and Explain how you will manage and monitor the network
Estimated required rate of return : Woidtke Manufacturing's stock currently sells for $21 a share. The stock just paid a dividend of $2.40 a share (i.e., D0 = $2.40), and the dividend is expected
Read about successful system implementation : Read about successful system implementation and then answer questions based on your understanding of the concepts.
Determining the value of the stock-simpkins corporation : Simpkins Corporation does not pay any dividends because it is expanding rapidly and needs to retain all of its earnings. However, investors expect Simpkins to b
Firm resource portfolio effectively : How do strategic leaders manage their firm's resource portfolio effectively to exploit its core competencies and leverage its human capital and social capital

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd