Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario. ( The submission
Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.The submission accurately describes or more current network security problems and at or more current infrastructure problems for each company and is aligned with the business requirements given in the scenario.B Analyze the given network diagram and vulnerability scan for both companies by doing the following: Describe two existing vulnerabilities for each company.The submission accurately describes or more existing vulnerabilities for each company. The vulnerabilities described are in alignment with the given network diagram and vulnerability scan. Explain the impact, risk, and likelihood associated with each described vulnerability from part B as it relates to each company.The submission explains the impact, risk, and likelihood associated with each described vulnerability from part B as it relates to each company. The explanation is complete and in alignment with the given network diagram and vulnerability scan.C Create a network topology diagram with details of the proposed merged network requirements.The network topology diagram with the details of the proposed merged network requirements is provided. The diagram is complete and meets the needs provided in the scenario.D Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCPIP protocol stack.The submission correctly identifies the layer for all components in the topology diagram referencing the layers of the OSI and TCPIP protocol stack.E Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.The submission explains the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram and includes the details of how each component addresses budgetary constraints. The explanation is in alignment with the given scenario.F Explain two secure network design principles that are used in the proposed network topology diagram.The submission explains or more secure network design principles that are used in the proposed network topology diagram. The explanation clearly names the secure network design principles being used and how each principle aligns with the proposed network topology diagram.G Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation: the name of the regulatory compliance requirement why the regulatory requirement is relevant to the newly merged company how the proposed merged network topology diagram meets the regulatory requirementThe submission accurately explains how the proposed merged network topology diagram addresses or more regulatory compliance requirements and includes all of the listed components. The regulatory compliance requirements are relevant to the newly merged company.H Describe two emerging threats that are applicable to the merged organization, including the following in the description: potential network security risks of implementing the topology potential performance impacts on the merged network after implementation of the proposed design how to manage the identified potential security risksThe submission accurately describes or more emerging threats that are applicable to the newly merged organization and includes all the given points.I Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary: a costbenefit analysis for onpremises and cloud infrastructure solutions a justification for your recommendations to implement the proposed secure merged network designThe submission summarizes the recommendations for implementation of the proposed merged network. The summary is logical and in alignment with the scenario and budgetary requirements and includes all listed specifications. J Acknowledge sources, using intext citations and references, for content that is quoted, paraphrased, or summarized.The submission includes intext citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.K Demonstrate professional communication in the content and presentation of your submission.Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.File RestrictionsFile name may contain only letters, numbers, spaces, and these symbols: File size limit: MBFile types allowed: doc, docx, rtf xls xlsx ppt pptx odt, pdf csv txt qt mov, mpg avi, mp wav, mp wma, flv asf, mpeg, wmv mv svg tif, tiff, jpeg, jpg gif, png zip, rar, tar, z
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started