ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 4 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 20 May 2017 My Price 9.00

DEPARTMENT OFAPPLIED INFORMATION SYSTEMS

Can i please get help answering these questions in the attachment provided

 

DEPARTMENT OFAPPLIED INFORMATION SYSTEMSCommunication Networks 3BAssignment: Networking ProjectDue Date:16 September 2016 at16:00Full Marks: 50Instructions:Submit the hard copy of your assignment (typed) to my office. No electronicsubmission (email) is considered.Only the hard copies submitted will be assessed.Late submission of assignments will be assessed a penalty of 10% per day.Question 1(15)You need to restrict your company’s rank-and-file employees to using the Internet onlyduring regular working hours (9am to 5pm, five days a week). However, as networkadministrator, you want to be able to access the network at any time of the day or night, sevendays a week. How can you meet the needs of the employees and yourself?Question 2(10)Your network uses basic authentication that centers on usernames and passwords. However,you have two ongoing problems: Usernames and passwords are frequently lost by negligentusers, and hackers have, on occasion, fooled employees into giving up their authenticationinformation. Identify five things you can do to strengthen the use of basic username andpassword authentication.Question 3(10)A company hires you to inventory its network. You must document all the network devices,their addresses (hardware and network), and the applications that run on the network.Describe how you can use Wireshark to obtain a listing of the network applications.

Attachments:

Answers

(11)
Status NEW Posted 20 May 2017 11:05 AM My Price 9.00

-----------

Attachments

file 1495278838-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)