Due to the Always Fresh expansion, management wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management. You must provide rationale for your choices by explaining how each control makes the environment more secure.
System Restoration Procedure Guide
Scenario
One of the security improvements at Always Fresh is setting up a system recovery procedure for each type of computer. These procedures will guide administrators in recovering a failed computer to a condition as near to the point of failure as possible. The goal is to minimize both downtime and data loss.
You have already implemented the following backup strategies for workstation computers:
§ All desktop workstations were originally installed from a single image for Always Fresh standard workstations. The base image is updated with all patches and new software installed on live workstations.
§ Desktop workstation computers execute a cloud backup every night at 1:00 a.m.
Consider the following for a computer that encounters a disk drive failure or some other error that requires restoration:
1. How much data has been modified between the last backup and the time of failure?
2. What images are necessary to recover the workstation?
3. What are the steps necessary to fix the problem that cause the data loss?
4. What steps should Always Fresh take to avoid a reoccurrence of this issue in the future?
Tasks
Create a procedure guide that describes the necessary steps for recovering a desktop workstation computer. Fill in details for each of the following steps:
1. Describe the processes of:
a. Fixing the problem that caused the failure in the first place. Keep the description of this process general. Just address the problem and ensure the recovery process starts with a functional computer.
b. Restoring the newly repaired computer to a base workstation.
c. Restoring local data for the specific workstation that failed.
2. Provide the steps to follow for each of the restore operations. Assume you will be using the Windows Backup and Restore utility.
Requirement: 2 pages each topic with 2 references each
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, Network Security Controls Recommendations
Submission Requirements. Please take time to read the following.
Names of all group members and student id must be included.
Only the Team representative will need to submit the file. Save your file as follows: [TeamName.pdf] e.g. TeamSuku.pdf
Submission is made as single PDF document only via the Canvas link Assessment Individual Assignment
The pdf document should have approximately 3200-3500 words (+/- 10%) inclusive of combined appendices (all SNA mapping)
This assignment should be done in a report format and NOT essay. Do include sections such as Executive Summary, Introduction, content by sections, Conclusion and References.
Pages of the report should have appropriate headers and should include printed page numbers
These sections do NOT form part of the word count (Title page, Abstract, Table of Contents, Page footers/headers and Reference Lists)
You must use the Swinburne Harvard Referencing style throughout your report and include an accurate list of references at the end of the report. You can access the correct style from Canvas.
The report should be written in 11-12 point font size and should use no more than 1/1.5 line spacing between each line
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Social Network Analysis (SNA) Report
Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense parameters that can resist network threats.
In 500-700 words, explain defensive scripting and how it works.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Programmed Security – Rubric Collapse All Defensive Scripting35 pointsCriteria Description
Defensive Scripting
5. Excellent35 points
The student comprehensively explain defensive scripting and how it works with extensive details and examples. Subject knowledge is excellent.
4. Good29.75 points
The student provides a detailed description of explain defensive scripting and how it works with supporting details and examples. Subject knowledge is good.
3. Satisfactory26.25 points
The student appropriately describes explain defensive scripting and how it works with some supporting details and examples. Subject knowledge appears to be good.
2. Less than Satisfactory22.75 points
The student outlines explain defensive scripting and how it works with few supporting details and examples. Some subject knowledge is evident.
1. Unsatisfactory0 points
The student provides an incomplete description of explain defensive scripting and how it works. Subject knowledge is not evident.
Sources5 pointsCriteria Description
Sources
5. Excellent5 points
Sources are academic, comprehensive, current, and/or relevant. Quoted material and paraphrasing expertly support, extend, and inform ideas but do not substitute for the writer’s own idea development. Sources are well synthesized to support major points.
4. Good4.25 points
Sources are academic, current, and/or relevant to support major points. Quoted material and paraphrasing is used effectively and consistently to support the major points and writer’s idea development.
3. Satisfactory3.75 points
Sources are adequate, relevant, and extend beyond assigned readings. Quoted material and paraphrasing are included to support major points and writer’s idea development.
2. Less than Satisfactory3.25 points
Few relevant sources beyond assigned readings are used to support major points. Important relevant sources are neglected. Quoted material and paraphrasing are overused.
1. Unsatisfactory0 points
No outside academic sources are used to support major points.
Argument Logic and Construction5 pointsCriteria Description
Argument Logic and Construction
5. Excellent5 points
Clear and convincing argument presents a persuasive claim in a distinctive and compelling manner. All sources are authoritative.
4. Good4.25 points
Argument shows logical progression. Techniques of argumentation are evident. There is a smooth progression of claims from introduction to conclusion. Most sources are authoritative.
3. Satisfactory3.75 points
Argument is orderly, but may have a few inconsistencies. The argument presents minimal justification of claims. Argument logically, but not thoroughly, supports the purpose. Sources used are credible. Introduction and conclusion bracket the thesis.
2. Less than Satisfactory3.25 points
Sufficient justification of claims is lacking. Argument lacks consistent unity. There are obvious flaws in the logic. Some sources have questionable credibility.
1. Unsatisfactory0 points
Statement of purpose is not justified by the conclusion. The conclusion does not support the claim made. Argument is incoherent and uses noncredible sources.
Language Use and Audience Awareness (includes sentence construction, word choice, etc.)2.5 pointsCriteria Description
Language Use and Audience Awareness (includes sentence construction, word choice, etc.)
5. Excellent2.5 points
The writer uses a variety of sentence constructions, figures of speech, and word choice in distinctive and creative ways that are appropriate to purpose, discipline, and scope.
4. Good2.13 points
The writer is clearly aware of audience, uses a variety of appropriate vocabulary for the targeted audience, and uses figures of speech to communicate clearly.
3. Satisfactory1.88 points
Language is appropriate to the targeted audience for the most part.
2. Less than Satisfactory1.63 points
Some distracting inconsistencies in language choice (register) and/or word choice are present. The writer exhibits some lack of control in using figures of speech appropriately.
1. Unsatisfactory0 points
Inappropriate word choice and lack of variety in language use are evident. Writer appears to be unaware of audience. Use of primer prose indicates writer either does not apply figures of speech or uses them inappropriately.
Mechanics of Writing (includes spelling, punctuation, grammar, and language use)2.5 pointsCriteria Description
Mechanics of Writing (includes spelling, punctuation, grammar, and language use)
5. Excellent2.5 points
The writer is clearly in command of standard, written academic English.
4. Good2.13 points
Prose is largely free of mechanical errors, although a few may be present. The writer uses a variety of sentence structures and effective figures of speech.
3. Satisfactory1.88 points
Some mechanical errors or typos are present, but are not overly distracting to the reader. Audience-appropriate language is employed.
2. Less than Satisfactory1.63 points
Frequent and repetitive mechanical errors distract the reader. Inconsistencies in language choice (register) and/or word choice are present.
1. Unsatisfactory0 points
Surface errors are pervasive enough that they impede communication of meaning. Inappropriate word choice and/or sentence construction are employed
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense parameters that can resist network threats.
Client Description : The Corner Store Network https://cornerstorenetwork.org.au/ The Corner Store Network is a not for profit organisation working on programs relating to climate change, food security, food waste, nutrition and ethical consumption in Australia and the Asia Pacific. Our consumer facing brand, Stock/Store, is the brand that customers and the public know and primarily the brand that allows us to undertake the work that we do. Background There are three main areas that they consider important features of their business: • Coffee Annually we import 20 tonne of coffee fr om Timor -Leste. We roast and distribute within Australia, whilst paying an above fair -trade price to coffee farmers and providing education and training to improve coffee harvest yields and quality. We also plant 1 tree per kilo of coffee that we roast and offset all carbon emissions. • Tree Planting/reforestation We are returning the forests of Timor -Leste, having planted 140,000 mahogany trees over the past 10 years. This program is internationally certified as a carbon offset program. • Food security/waste and nutrition We are running programs in Australia and Timor -Leste to transform ‘food waste’ into preserved food, made available for vulnerable communities to access and giving primarily women skills in food preservation and knowledge around nutrition. Strengths • We have really strong relationships on the ground in Timor -Leste within the communities in which we work. • Our transparency in what we say we do and what we do. Customers can very easily and transparently see where their money goes a nd what it supports and feel comfortable that we are doing what we say we are doing. Weaknesses • Our size. Given the fact that we are a small team, we are stretched across tasks and stretched with the number of hands to get everything done that is needed o n a day to day basis • The coffee market is ever saturated with lower quality coffee that is being purchased at appallingly low cost to the detriment of coffee farmers worldwide. This is affecting roasters like us trying to do the right thing and making it m ore difficult to cut through in a crowded market
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Creditors’ Voluntary Liquidation File (CVL)
It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their information assets.
Use the Cisco Packet Tracer application to create a network diagram that makes use of the following devices listed below, which belong to Company X. The diagram should illustrate your knowledge of network defense by placing network assets in their proper location, so as to ensure their protection. Include, within the diagram, any small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices.
Within the diagram make sure to include at a minimum:
10 mobile devices (phones/laptops/tablets)
Five desktop/stationary computers
Two servers (file/email)
One printer
One router/firewall
One WAN/gateway connection
One switch
One corresponding backup/replication asset for disaster recovery (local or remote storage/server)
Note: Any IP addresses used should be labeled next to the corresponding device.
Then, create a report outlining the abilities of the network topology in reference to securing network devices and other information assets used by Company X. Make sure to address the following within the report:
A detailed explanation of the topology design addressing the “why” and “how” of the topology defenses solution and design, specifically threat models, motivations (such as insider threat), and ideologies
Network defense solution list (i.e., software/hardware used to protect information assets)
Encryption policies used by the network and end-users
Disaster plan recovery, including restoration plans
When completing the report for this assignment, refer to the “Report Template.”
APA style is not required, but solid academic writing is expected.
This assignment uses a basic scoring guide, provided by your instructor. Please review the scoring guide prior to beginning the assignment to become familiar with the expectations for successful completion.
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Cisco Packet Tracer application to create a network diagram
The management team is comfortable that the service level agreements can be met with respect to things they can control, namely employee performance and knowledge base quality. They are, however, concerned that because the majority of the help desk support infrastructure is based on Web-based self-service, an outage on the Web site could lead to missed service levels.
Describe what can be done to ensure the security and availability of the Web-based infrastructure and what the company can do to keep the help desk running in the event of a Web site outage (business continuity). The discussion about security should focus on 2 levels:
Network infrastructure/security
Application infrastructure/security
Finally, discuss cultural implications for IT support to encourage effective interactions with those customers who differ in beliefs, behaviors, values, or views. Make sure to cover personal cultural rules/biases and their impact to societies.
Add the discussion about security and business continuity to the section titled Performance Management.
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals.
Length: Minimum of 400 words Students will be required to create 1 new thread, and provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.Question:The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Protections from the security software must continue when the device is taken off the network
Networking Assignment Designing a solution for Small Office Home Office (SOHO) network Mark & Horton tax accountants have opened a new office in Melbourne, Australia. They are committed to providing taxation and financial planning services to both individuals and small business owners. Currently, they have four (4) full-time tax accountants, two (2) junior accountants and two (2) receptionists appointed to facilitate the clients. Additionally, two (2) financial advisors work two days a week. You have been hired as a network technician to help in the design and deployment of this network. Tax Accountants: 04 Junior Accountants: 02 Receptionist: 02 Financial Advisors: 02 Total Host= 10 host Objectives: • Set up a small office network, identify devices, network components and media type used • Assigning IP addresses to devices connected in a LAN environment • Identify issues and suggest solutions related to network or internet Scenario – Designing a solution for Shine Dental Clinic (Network Solution): Tom and Steph has recently opened a new clinic, “Shine Dental”, in Sydney, Australia. They are committed to providing quality dental services to people of all age group. They have four full-time surgeons using surgery rooms, four assistants working with the surgeons while performing surgery, three receptionists/admin staff, completing daily paperwork, admin, client consulting and handling the front desk. The area for the new office is 250 sqm approximately. For detailed dimensions and floorplan, refer to Figure 1. The clinic required eight workstations, one server and a printer and needed to be installed at the following locations: • One reception desk with space to place two computers (Workstation 5 and 6), • One small consulting room (Workstation 7) • One server room with extra space to place an additional computer (Server, Workstation 8) • Four surgery rooms (Workstation 1 – 4) The entire floor divided with each other by drywall sheets. The office is fully furnished (except computers, networking devices and cabling) The owner of “Shine Dental” has purchased eight (8) desktop computers of the same type. Table 1 shows the sample specification. Desktops x 8 Specifications Acer Aspire TC-series Desktop Processor Brand/Type AMD A10-7800 RAM 16GB HDD 1TB Wired Networking Gigabit Ethernet Connectivity 1xHDMI, 1xVGA, 3xUSB3.0, 4xUSB 2.0, RJ45 Operating System Windows 10 Pro Table 1 The owner of “Shine Dental” has also purchased one (1) server, eight (8) monitors to be connected with desktops and four (4) overhead screens, with the specifications provided in Table 2, Table 3 and Table 4 simultaneously for your reference. Server x 1 Specifications Acer TS-series Server Processor Brand/Type Intel Processor RAM 64 GB HDD 2TB Wired Networking Gigabit Ethernet Connectivity 1xHDMI, 1xVGA, 3xUSB3.0, 4xUSB 2.0, RJ45 Operating System Windows 2012 R2 Table 2
Monitors x 8 Specifications BenQ BL2400 series Brand BenQ Display LED-TN Dimension 579 x 213 x 502 mm Display resolution 1920 x 1080 Connectivity HDMI, D-sub Display size 24” Table 3 Overhead screens x 4 Specifications Sony 3200 series Brand Sony Display LED Dimension 731.8 x 87.3 x 435 mm Display resolution 1280 x 720, 1366 x 768 Connectivity DVI, USB, Ethernet, Antenna in Display size 32” Table 4
Figure 1 In addition to the computers, he has also wanted to purchase one LaserJet multifunction printer for print/copy/scan/fax. The printer should have USB 2.0, Gigabit LAN, Wi-Fi(n) and other prominent printing and scanning features. All computers/server has got a dedicated screen. In addition to that, there are four additional overhead screens attached in the four surgery rooms for patients to view local TV channels. Those four screens are also attached to the main computers in the surgery room. Doctors should display x-rays on the overhead screen for patients, but simply changing the input on the TV, your job is to connect the overhead screen/TV to the computer as an extended display or mirror and the Antenna. You are also required to set up a backup for all the computers/server. All the backups should run each night and should get stored at one physical location within the premises, and a copy of the local backup has to be held on to the cloud utilizing one of the cloud services. As a consultant, you can choose any cloud service of your choice but must justify your recommendation. Assume that you have been hired as a network technician to help design and deploy this network. Perform the following tasks to support this. Task 1 To inter-connect the desktop computers and connect the overhead screens/TV with the computers and TV antenna, you have decided to use a wired network. What is the primary transmission media, connectors, adaptors you would use for this? For your recommendation of media, consider and explain the following criteria: • Speed • Length • Ease of installation • Compatibility with intermediary devices Your answer must also include transmission media, connectors, adaptors, and other necessary devices to help you implement this successfully. Task 2 Waiting customers should be able to access the “Shine Dental” Wi-Fi network for internet usage. What devices will you need to extend your wired network to support wireless devices with maximum speed and make sure that customers using “Shine Dental” internet do not cause interruption to the clinic’s network? Justify your answer. Task 3 In addition to the workstations and server, the multifunctional printer needs to be connected to the network. Would you connect it via a wired media or wireless media? Justify your answer. Recommend a make and model of the multifunctional printer as per the customer requirement. Task 4 Complete Table 5 to assign suitable static IP version 4 addresses to the devices (with subnet mask) on the network. You have decided to go with the class C private IP address range 192.168.30.0/24 (except where it is indicated otherwise). You need to complete 3rd column of Table 5. Device IP address IP address with subnet mask Workstation_1 (Surgery1) 1st usable IP address 192.168.30._ ? _ /24 255.255.255._ ? _ Workstation_2 (Surgery2) 2nd usable IP address 192.168.30._ ? _ /24 255.255.255._ ? _ Workstation 3 (Surgery3) 4th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 4 (Surgery4) 5th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 5 (Fdesk1) 7th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 6 (Fdesk2) 8th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 7 (Consulting) 10th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 8 (BDesk) 11th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Server_9 (Server) 14th usable IP address 192.168.30._ ? _ /24 255.255.255._ ? _ Printer 192.168.200.100/24 192.168.200.100 /24 255.255.255._ ? _ Table 5
Task 5 Implement the network topology (Figure 2 is a partial design to assist you) using a packet tracer. For example, it would help if you considered the following: • All devices (Server, workstations and printer etc.) mentioned in table 5 are labelled and have their IP addresses and subnet mask configured (as per your answer in Task 4) • Select the appropriate media in packet tracer, label the media type and use the switch 2960 with 24 ports and two-gigabit uplink ports to interconnect the Desktops • Connect workstation_5 and workstation_6 to one of the “5 port switch” of your choice and connect the switch to the 24-port switch • A standard wireless access point is added and configured with security. This wireless access point should be then connected to the 24-port switch via suitable wired media. • Printer is configured and connected to the previously added “5 port switch.” Figure 2 Task 6 Test the network using a suitable network utility and verify that workstation_7 can communicate with other workstations and servers. Provide screenshots to confirm that you have used the appropriate tools for this purpose. Use command-line utility only to test the connectivity Task 7 Configure the most secure protocol (available in packet tracer) to authenticate three newly hired part-time employees’ “Jason”, “John”, and “Steph”, assign 21st, 36th and 43rd usable IP addresses, respectively. Users should be able to differentiate the network before connecting to the office network easily. For example, provide screenshots and justify. Label Jason’s laptop as “jason_laptop”, John’s laptop as “john_laptop”, and Steph’s laptop as “steph_laptop” and configure in packet tracer. Task 8 Assume that Workstation_5 (consulting room) is a Linux box. You have run standard command-line tools and receive the following output:
Figure 3 Use Figure 3 above to answer the following questions:
What is the IP version 4 address of this machine?
What is the IP version 6 address of this machine?
What is the MAC address of this machine?
What is the default gateway?
Ping command gives the following error below, and the site cannot be opened. Give possible explanations, and provide a solution. Task 9 Assume that the network has been physically set up, as you have demonstrated in your packet tracer file (created in task 8). Users have complained that none of them can print. Using the packet tracer file, troubleshoot this issue and identify what might be causing this. Assume that the printer is mechanically functional and has no physical defect. Identify and discuss. The answer should be based on Task 4. Task 10 “Shine Dental” needs to store an image of all workstations and server in one location. Backups need to run each night, two copies of the backups need to be maintained at Shine Dental premises, and another copy will be stored on the cloud. You have decided to install NAS (Network Attached Storage) as a solution. How many hard drives would you install in NAS, and what raid Level would you use and why? Provide a cost-effective solution for the business. Performance is not essential. What media would you use to connect NAS to the network, and how would you connect it. For demonstration purposes, you can include a server in packet tracer, label it as NAS, and assign it 56th usable IP address to NAS. You must provide a relevant screenshot as an example
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Designing a solution for Small Office Home Office (SOHO) network Mark
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.
You will use the Sandbox lab to complete this project. Note: You must complete this project in one sitting, as the lab environment is non-persistent. Be aware of your time as you complete the lab. You can extend your lab when the time warning appears.
You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned.
I. Network Reconfiguration: Update the network using the Network Layout Table in the Project Three Network Reconfiguration Specifications spreadsheet. Include screenshots of the following:
A. Network diagram
B. Port assignment and VLAN assignment for each switch.
Traffic Flow Configuration: Shape the traffic flow using the Firewall Traffic Shaping Goals in the Project
Three Network Reconfiguration Specifications spreadsheet. Include screenshot(s) of the following:
A. Configure a firewall rule to allow port 80 HTTP from the WAN to the web server.
B. Configure a firewall rule to allow port 443 HTTPS from the WAN to the web server.
C. Configure a firewall rule to block port 80 HTTP from the WAN to any other system.
D. Configure a firewall rule to block port 443 HTTPS from the WAN to any other system.
III. Organizational Security Strategy
A. Explain how the security posture of the organization has been improved by the restructuring.
B. Describe how the tenets of the CIA triad (confidentiality, integrity, and availability) are affected by the restructuring.
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Network Reconfiguration: Update the network using the Network Layout Table in the Project Three Network Reconfiguration Specifications spreadsheet.
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.
The objective of this project is to use the perceptron learning method and design an artificial neural network (ANN) to train a simple system (single layer perceptron) for the recognition of handwritten digits (0, 1, …, 9).
Design a fully connected network structure of 784 input nodes and 10 output nodes.The input to your single layer network architecture will be a set of binary pixels representing a 28×28 image of handwritten digits. The output should indicate which of the digits (0,….,9) is in the input image.
Use the MNIST database of handwritten digits available on Blackboard-Homepage-Handwritten Digits Dataset.
Select a subset of the MNIST database consisting around 500 images of handwritten digits (0,…,9) for training the system, and use another 100 images for testing the system. Create binary or bipolar images of handwritten digits from gray scale images available in MNIST by simple thresholding (indicate the threshold value you used).
Plot a learning curve that illustrates the mean square error versus iterations.
(One iteration: apply all the training inputs once to the network and compute the mean square error).
Plot the percentage error in testing your handwritten digit recognition system as a bar chart.
(Mean error occurred while testing each digit with the test data).
Task #1: Repeat this experiment for different learning rate parameters (at least 3 experiments. Start
with a large value and gradually decrease to a small value).
Task #2: Repeat Task #1 with a large database. The first 10000 images for training (image indexes
from 0-9999) and test with another 1000 images (image indexes from 20001-21000).
Task #3: Repeat Task #2 with multilevel data (without thresholding the input data, normalize the
input data, use sigmoid function for output thresholding). What can you note comparing with part 2?
Task #4: Compare your results with the SVM results (what you have got from the last project).
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. design an artificial neural network
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.