CMIT 370 DISCUSSIONS.
A minimum of 200 words is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement.
Describe each of the DNS zone types that are available in Windows Server 2016. Explain why you would use each type of zone. For example, when would you use a Standard Zone versus an Active Directory Integrated Zone? Make sure you include Stub Zones in your answer. Also, include in your answer methods for securing and protecting DNS servers and clients.
Compare and Contrast IPv4 and IPv6. Find examples of companies who are currently using IPv6. What are some of the benefits of using IPv6 over IPv4 and vise versa
One of the most important concepts is all of networking is NAT. What is NAT? How does it affect web log files? What are some ways that you can view your public IP Address? Discuss the IP Addresses that are not routable. Describe the LAN and WAN addresses on your system, using tools like ipconfig and www.ipchicken.com.
What types of things would you suggest to a manager be included in a Network Access Policy? Should users be allowed to bring their own equipment? Can users connect to the company’s network? Can users do personal work on company issued equipment? Find an example policy that a company has and indicate whether you agree with the policy.
This week we discussed Fault Tolerance. The Distributed File System is only one example of Fault Tolerance. Find some other technologies from Microsoft or other vendors that help protect data. End your discussion with justifying to your manager why the company can benefit from such a (likely expensive) purchase. What is the cost and can you justify it?
You will have a fairly large project on SOFTWARE-DEFINED NETWORKING in your 495 capstone. Here is a chance to get some background and understanding of the topic. Your manager has asked you, one of her most technical employees, to make a presentation to your co-workers on SOFTWARE-DEFINED NETWORKING. Explain what it is, what the advantages are, and how it can benefit your company.
CMIT 320 DISCUSSIONS.
Research a recent security breach (in the last year).
You can use
2020 Data Breaches | The Most Significant Breaches of the Year
to identify one breach and then use the internet to get more information on that breach.
1. What was the breach about?
2. How many users were affected?
3. Could the breach have been avoided and why?
An IT administrator for Acme Inc., a small anvil manufacturing company, used her personal email address when creating cloud-based work accounts with CloudEmails.com for the company’s employees. However, when Acme decided to fire the administrator for unspecified issues, it discovered that she was the only one with admin access to the CloudEmails.com accounts, which included email files.
Complicating matters was the fact that Acme could not find the password on the former administrator’s computer; officials suspected that she deleted key files after she was terminated.
When the company contacted the fired administrator, she refused to provide the password credentials. CloudEmails.com, meanwhile, also refused to allow access to the files, saying that only the administrator could agree to allow access to her personal account.
· What kinds of mistakes were made by the company and the administrator?