Juan Garcia is the network administrator for a small company that also maintains its own web server. He has taken the following precautions: All the computers are patched, have antivirus software, and have unneeded services shut down. The network has a firewall with proxy server and IDS. The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days. Has Juan done enough to secure the network

Answers

Answer 1
Answer:

Answer:

Yes Juan has done enough to secure the network

Explanation:

All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.

The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network

The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.


Related Questions

Imagine that you only used assignment statements for the design of the seven-segment display decoder. How would you obtain the Boolean expressions for the seven segments? What would your VHDL design module code look like? Which way do you prefer designing the seven-segment display decoder, this way or by using the advanced VHDL statements you used in task 1?
Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable. Public class Employee { Private String empID; Private boolean hourly; ) . . _______ { Hourly = isHourly; } } A) public void setHourly(String isHourly) B) public void getHourly() C) public boolean getHourly() D) public boolean setHourly(boolean isHourly)
How many bits would be needed to count all of the students in class today? There are 5 children in the class.
Write a function in Matlab which takes as input an integer x and as output returns the biggest prime number that is less than or equal to x. For example, if the input is 7, the output would be 7. If the input is 40, the output would be 37. (Reminder: isprime.)
Write a program that asks the user to enter two numbers,obtains the two numbers from the user and prints the sum,product,difference, and quotient of the two numbers

Microsoft word 365 allows cells to be split into how many columns

Answers

Answer:

Microsoft word 365 allows two columns

Yep it’s that I agree with him because I agree with him because I agree with him because I know his answer is right so I agree with him:)

How does abstraction help us write programs

Answers

Answer:

Abstraction refines concepts to their core values, stripping away ideas to the fundamentals of the abstract idea. It leaves the common details of an idea. Abstractions make it easier to understand code because it concentrates on core features/actions and not on the small details.

This is only to be used for studying purposes.

Hope it helps!

You are an administrator for the Contoso Corporation. You have client software that receives its configuration from a shared folder. Therefore, you need to make sure that this shared folder is highly available. Since is used by hundreds of users, many at the same time, you want to make sure that performance is high. What would you do

Answers

In order to make sure that the shared folder is accessible and the performance is high at all times, it would be best to house it on a secure file sharing/storage services, such as Box or Dropbox.

Susan is taking a French class in college and has been asked to create a publication for her class. What feature can sheuse to help her develop her publication in French?
Research
Grammar
Language
Spell Check

Answers

the answer is Language

Answer:

Essayons

Explanation:

Which of the following protocols is used to unsure secure transmissions on port 443?A. HTTPSB. TelnetC. SFTPD. SHTTP

Answers

Answer:

A. HTTPS

Explanation:

Default HTTP port is 80. This means that the server request is received on port 80. But default HTTP request is susceptible to interception. In order to prevent it, HTTP communication is secured using SSL encryption (HTTPS protocol). In this case the Url string begins with 'https://' which differentiates it from normal web request. The default port used for HTTPS service is 443 instead of 80.

When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the location and size of the control.

Answers

Answer:

When you move or size a control in the Form Designer, Visual Studio automatically adjusts the properties that specify the location and size of the control.