Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please provide a detailed answer. 1. Your company decides to use cloud services for email and other capabilities. Upon reviewing this practice, you realize every
Please provide a detailed answer.
1. Your company decides to use cloud services for email and other capabilities. Upon reviewing this practice, you realize every user or device that connects to the cloud service must be authenticated. As a result, you work with your cloud service provider to ensure that only properly authenticated users and devices are allowed to connect to the system. Determine: [a] the identity of each user is authenticated or verified as a prerequisite to system access. [b] the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access. 2. You are setting up a new environment to Home. To properly isolate the network, you install a firewall between it and other networks and set the firewall rules to deny all traffic. You review each service and application that runs in the new environment and determine that you only need to allow http and https traffic outbound. You test the functionality of the required services and make some needed adjustments, then comment each firewall rule so there is documentation of why it is required. You review the firewall rules on a regular basis to make sure no unauthorized changes were made. Determine if: [a] network communications traffic is denied by default; and [b] network communications traffic is allowed by exception. 3. Explain in detail about various tools and technologies that are used to monitor and deal with unauthorised devices. 4. Discuss in detail about various content management service providers and tools available in the market. Compare at least two tools and their features, benefits and limitations. 5. Discuss in detail about various kinds of firewalls in the market and the various vendors for the same. Compare the features, benefits and limitations of various kind of firewall products offered Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started