Question

Engineering-12 Workstations Accounts-8 Workstations Internet Web Email Server Engineering File Server Human Resources -4 WorkEdge Devices Printer Desk Telephone Desktop PC Server Rackmount Server LaptopConnecting Devices Router Switch Wireless Access Point (AP) <Network Name Network Name> Firewall External Network / Internet

Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can justify your design choices you may be able to purchase some more equipment. You will need to provide a new network design diagram in PowerPoint format, thankfully Jim has included a couple of slides with various network equipment elements that you can use as templates. What would you recommend? Justify your recommendation. (300-400 words)

Question 3 (20 marks) – Security

Whilst doing your evaluation Soylent Co suffers a data breach. Jim asks you to add any necessary security controls to your design. As you do so you also become aware of cross departmental security issues as the engineering department are able to see all the human resources information on the file server. What controls do you put in place to rectify these problems? (300-400 words)

Engineering-12 Workstations Accounts-8 Workstations Internet Web Email Server Engineering File Server Human Resources -4 Workstations Administration-6 Workstations フ HR File Server
Edge Devices Printer Desk Telephone Desktop PC Server Rackmount Server Laptop
Connecting Devices Router Switch Wireless Access Point (AP) Firewall External Network / Internet Trunk connection
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Question 2Internet Firewall Server Router PC RS IP Phone Switch Switch PC Desktop Pc Desktop PC Activat Printer

The above network diagram shows us the different network devices, which have been used for setting up a new IT infrastructure.

In the above network diagram a central router device is connected which is used to connect the two different switches.

The reason behind using the switches is if the network devices are to be increased, that can be accommodated in future and a firewall is used for protecting the network and IP phone is used for connecting the internet and a common printer is used for sharing the resources and we can save the budget.

A central server is used to provide client server environment and a router which is used for connecting the switches and few desktop PC to connect to swithches.

Q3) the below list is the necessary steps that are required for controlling the file server

  1. First encrypt the files using the bit locker which protects the data from stealing.
  2. Use an antivirus software and update it regularly.
  3. Use the windows updates that are used for patching the files.
  4. Use NTFS file system to protect the environment using some file security features.
  5. Remove unnecessary files and software’s to avoid attacks.
Add a comment
Know the answer?
Add Answer to:
Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can j...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT