Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario. ( The submission

Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.(The submission accurately describes 2 or more current network security problems and at 2 or more current infrastructure problems for each company and is aligned with the business requirements given in the scenario.)B. Analyze the given network diagram and vulnerability scan for both companies by doing the following:1. Describe two existing vulnerabilities for each company.(The submission accurately describes 2 or more existing vulnerabilities for each company. The vulnerabilities described are in alignment with the given network diagram and vulnerability scan.)2. Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.(The submission explains the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company. The explanation is complete and in alignment with the given network diagram and vulnerability scan.)C. Create a network topology diagram with details of the proposed merged network requirements.(The network topology diagram with the details of the proposed merged network requirements is provided. The diagram is complete and meets the needs provided in the scenario.)D. Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.(The submission correctly identifies the layer for all components in the topology diagram referencing the layers of the OSI and TCP/IP protocol stack.)E. Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.(The submission explains the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram and includes the details of how each component addresses budgetary constraints. The explanation is in alignment with the given scenario.)F. Explain two secure network design principles that are used in the proposed network topology diagram.(The submission explains 2 or more secure network design principles that are used in the proposed network topology diagram. The explanation clearly names the secure network design principles being used and how each principle aligns with the proposed network topology diagram.)G. Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation: the name of the regulatory compliance requirement why the regulatory requirement is relevant to the newly merged company how the proposed merged network topology diagram meets the regulatory requirement(The submission accurately explains how the proposed merged network topology diagram addresses 2 or more regulatory compliance requirements and includes all of the listed components. The regulatory compliance requirements are relevant to the newly merged company.)H. Describe two emerging threats that are applicable to the merged organization, including the following in the description: potential network security risks of implementing the topology potential performance impacts on the merged network after implementation of the proposed design how to manage the identified potential security risks(The submission accurately describes 2 or more emerging threats that are applicable to the newly merged organization and includes all the given points.)I. Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary: a cost-benefit analysis for on-premises and cloud infrastructure solutions a justification for your recommendations to implement the proposed secure merged network design(The submission summarizes the recommendations for implementation of the proposed merged network. The summary is logical and in alignment with the scenario and budgetary requirements and includes all listed specifications.) J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.(The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.)K. Demonstrate professional communication in the content and presentation of your submission.(Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.)File RestrictionsFile name may contain only letters, numbers, spaces, and these symbols: !-_.*'()File size limit: 200 MBFile types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, csv, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

C++ Database Development

Authors: Al Stevens

1st Edition

1558283579, 978-1558283572

More Books

Students also viewed these Databases questions

Question

here) and other areas you consider relevant.

Answered: 1 week ago