logo image

Section 12.8 Network Security

Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following:

* Server systems are kept in a locked server room
* User accounts on desktop systems have strong passwords assigned
* A locked door is used to control access to the work area. Users must use ID badges to enter the area
* Users connect their personal mobile devices to their computers using USB cables
* Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use

Based on this information, what should you recommend your client do to increase security?

a. Move the server systems to an empty cubicle in the work area.
b. Assign users easy-to-remember simple passwords so they won’t be tempted to write them down
c. Disable the USB ports on users workstations
d. Provision each employee with their own computer system.

Disable the USB ports on users workstations
A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following:

* They use an 802.11a wireless network
* The wireless network SSID is set to BWLAN
* The wireless network uses WPA2 with AES security
* Omni-directional access points are positioned around the periphery of the building

Based on this information, what should you recommend your client do to increase their wireless network security?

a. Configure the wireless network to use WEP security
b. Change the SSID to something similar to BigBikeInc
c. Enable SSID broadcast
d. Upgrade to an 802.11g wireless network
e. Implement directional access points

Implement directional access points
Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get Internet connectivity. You are concerned that allowing them to do this could result i the spread of malware throughout your network. What should you do? (select two)

a. Implement MAC address filtering
b. Implement private IP addressing with a NAT router facing the Internet
c. Implement SNMP traps on your network swtich
d. Enable port analysis on your network switch
e. Implement static IP addressing

Implement MAC address filtering
Implement static IP addressing
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device:

* They use an 802.11n wireless network
* The wireless network is broadcasting an SSID of Linksys
* The wireless network uses WPA2 with AES security
* Directional access points are positioned around the periphery of the building

Based on this information, what should you recommend you client do to increase their wireless network security ? (select two)

a. Disable SSID broadcast
b. Change the SSID to something other than the default
c. Configure the wireless network to use WPA with TKIP security
d. Upgrade to an 802.11g wireless network
e. Implement omni-directional access points

Disable SSID broadcast

Change the SSID to something other than the default

Need essay sample on "Section 12.8 Network Security"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy