Lalalalalalala

Submitted by: Submitted by

Views: 147

Words: 478

Pages: 2

Category: Other Topics

Date Submitted: 04/04/2014 03:52 PM

Report This Essay

Lab 2 Questions

1 It is important to do a risk assessment so that you are aware of the vulnerabilities of the hardware that you currently have in place. You would need to know the risks that the current infrastructure has so that you are able to calculate the losses that you might come upon such as loss in terms of data.

2 It tags the data in your systems so that it can be found quickly and efficiently. It also can be used to de-duplicate your information which cuts storage and backup data costs while speeding up company data searches.

3 You could create a Patch Management Plan with the help of Microsoft Updates which are available periodically for your system. These types of patches and updates can help when you are working with a tight budget or have no budget.

4 It helps by showing you how your infrastructure performs in terms of security, data speed, and how quick a response or alert is made when your infrastructure is being attacked or is down in any kind of way.

5 An example of multi-factor authentication would be an initial login that needed a simple username/password and then required an eye scan or fingerprint. An application that would benefit from this type of authentication would be one that held very personal information about yourself or information about a company that would be very harmful if it was stolen.

6 Workstation Layer. You would have more apps on this layer that would need anti-virus protection.

7 A personal host firewall is managed on the individual computer that the firewall is installed on. Therefore, the administrator has to have access to the computer to install and configure the firewall. This sets up a sort of "perimeter" for the network as a first line of defense, regulating the flow of data before it even reaches the individual computers that comprise the network. I would most likely deploy these on every domain to make sure that the network or infrastructure is secure. They help slow down the speed in which a hacker can...

More like this