Preview

nt2580 unit 2 assignment 1

Satisfactory Essays
Open Document
Open Document
391 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
nt2580 unit 2 assignment 1
In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.
The Window of vulnerability would be close to two weeks of time where their system can breached again and my recommendation if I were the administrator to remedy this gap of time I would attempt to have around the clock staff working on this in order to prevent further breaches of security until the Window of Vulnerability is closed off and made to be secure and available for public use again. The IT staff would have to be on board to work around the clock to correct this gap in security as fast possible the administrator should ask for volunteers to avoid rocking the boat and upsetting his/her IT staff. In my opinion this would be the best course of action to close the security gap as soon as possible and it would provide your staff with overtime if they want to take that opportunity but also

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Assignment

    • 634 Words
    • 3 Pages

    The skin is an organ composed of three anatomical layers: epidermis, dermis, and hypodermis. These anatomical layers together function to provide the body with a protective barrier, body temperature regulation, sensation, excretion, the outer layer of skin…

    • 634 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Good Essays

    The genome4u is a scientific study project at a large university that is intended to provide an order of the genomes of a hundred thousand volunteers. This genome lab setup has various amounts of routing protocols, in which the task would be getting the protocols interlinked so that design can be changed. The different Cisco switches represent the various VLANs that can be configured for the different project teams in the lab (Oppenheimer, 2005). Router-EIGRPs are the internal routers of the research lab network. Router-EIGRP/OSPFs and Router-EIGRP/RIPs are the routers that are at the Fundraising office interface and the Biology lab interface respectively. The file servers are where the volunteer’s data files will be stored. The design will now spread apart similar data to travel across it from different internet connections.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment 1

    • 4614 Words
    • 19 Pages

    QID ch1 ch1 QUESTION A "computer competent" person must know how to upgrade and repair their computer A computer monitor is a video display device ANSWER option2 option1 TRUE TRUE OPTION1 OPTION2 FALSE FALSE is the term used to describe a communications system connecting two or more computers together FALSE FALSE FALSE FALSE FALSE FALSE FALSE hard disk FALSE FALSE the number of children born in Chicago in 1950 mean of your credit the percentage of card balances for the brown-eyed peop past three years in your class optical disk DVD is the conection describes the relationship between among computer users, often seen at a data element and a conferences database record OPTION3 OPTION4…

    • 4614 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    I'm one of the TAs for the online class CGS2531 this Fall Semester. I completed the required online training sessions: FERPA Basics and Preventing Harassment. Please find attached to this email the certificates of completion of the aforementioned courses. Let me know if there is any other information or training session needed.…

    • 52 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Unit 2 assignment

    • 475 Words
    • 2 Pages

    RBOCS- Regional Bell operating company (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell System or "Ma Bell") by a U.S. Federal Court consent decree on December 31, 1983. The seven original regional Bell operating companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. Each of these companies owned at least two Bell operating companies (Bell operating company). The BOCs were given the right to provide local phone service while AT&T was allowed to retain its long-distance service.…

    • 475 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 361 Words
    • 2 Pages

    According to the standard account, true belief is not sufficient for knowledge. It states that knowledge requires, not only that our beliefs be true, but that we have good reasons for believing them to be true. In standard account, knowledge is justified true belief.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 468 Words
    • 2 Pages

    Main Reading: Solomon, M.R. (2011) Consumer behaviour; buying, having and being, 9th edn. New Jersey: Pearson Education Inc…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.…

    • 791 Words
    • 4 Pages
    Good Essays