SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 6 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 13 Dec 2017 My Price 10.00

Determine and list the network services needed to implement

This is for my CMIT 265 paper. Please let me know if you have any question. I will need it by sunday at 3pm. Please no delays

III. Network Services Design

 

A.    Network Services

 

Business Needs

 

Assess the business needs

 

Proposed Network Services

 

Determine and list the network services needed to implement the design. Provide setup and licensing information (as necessary).

 

Justification

 

Justify your determination that the network services are needed and will meet the business needs

 

Example: There needs to be a DHCP, DNS, File, and Active Directory Server on the network. Please give examples of why these servers are needed and what role they will play. Cover policy and process such as configuration management, asset inventory, and baseline configuration.

.

 

B.    Network Security Measures

 

Business Needs

 

Assess the business needs

 

Proposed Network Security Measures

 

Outline network security measures needed in the design. This includes training, monitoring, and maintenance procedures. Provide implementation details of these measures.

 

Justification

 

Justify your determination that the network security measures are needed and will meet the business needs.

 

 

Example: Discuss Patching, Scanning, SIEM, Logging and other measures.  How will the systems in this company’s network be updated? Discuss Firewall rules, for example all traffic will be allowed out or just ports 80 and 443 traffic will be allowed out. What version of Anti-Virus should be used on machines?

 

 

Bibliography

 

Be sure to use references that are scholarly in nature and follow the formatting rules of the IEEE

 

Attachments:

Answers

(5)
Status NEW Posted 13 Dec 2017 10:12 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)