Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Your organization uses a time - keeping application that only runs on Windows 2 0 0 0 and does not run on newer OS versions.

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network.
Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network.
You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks.
Which solution should you implement to protect the network while also allowing operations to continue as normal?
answer
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.
Implement a host-based firewall on each Windows 2000 workstation, and configure them to automatically download and install updates.
Install antivirus software on the Windows 2000 workstations, and configure them to automatically download and install updates.
Create a dedicated network for the Windows 2000 workstations that\'s completely isolated from the rest of the network, including a separate internet connection.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction to Wireless and Mobile Systems

Authors: Dharma P. Agrawal, Qing An Zeng

4th edition

1305087135, 978-1305087132, 9781305259621, 1305259629, 9781305537910 , 978-130508713

More Books

Students also viewed these Programming questions

Question

In OSI Model, Transport Layers uses _ _ _ _ _ _ _ protocols

Answered: 1 week ago

Question

1. Summarize the application of a chi-square test.

Answered: 1 week ago

Question

2. Define and apply the components in hypothesis testing.

Answered: 1 week ago