CIS 21 U2 Review - Essay Example

Comments (0) Cite this document
They include; host -based printers and host- based modems (Technet, 2015). Web application firewall refers to a server application that monitors a conversation between a client browser…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
CIS 21 U2 Review
Read TextPreview

Extract of sample "CIS 21 U2 Review"

CIS 21 U2 Review Activity 3 1. Which technology is only used for monitoring and capturing the content of data communications on a network?
I.D.S stands for intrusion detection system. It monitors all the inbound and outbound network activities (Paloalto 2015). Also, it reports any form of malicious activity that may attack the system.
2. What is the difference between a host-based, and web application based firewall?
Host -based firewall refers to any device attached to the computer for proper functionality. They include; host -based printers and host- based modems (Technet, 2015). Web application firewall refers to a server application that monitors a conversation between a client browser and web server.
3. Your organization is in the process of implementing security controls throughout the corporate network. A security device is needed to actively scan and monitor network activity and then alert and block any access that is suspicious. What device is the best option for this scenario?
NIPS, it stands for network intrusion prevention system. It controls and monitors all the activities in a system. Moreover, it prevents malicious programs that may interfere with proper functionality.
Activity 3-2
1. What is the role of NAT on a network?
NAT is a short form of Network Address Translation. As the name suggests, it translate IP address. It tightens network security as it unmasks all the incoming and outgoing addresses. It ensures a standard address is used in communication worldwide.
2. .Which technology allows telephone, email, fax, web, and computer actions to be integrated to work together?
PBX, it stands for Private Branch Exchange. It allows for private telephone networking in an organization. Usually, it uses open interfaces thus making it more flexible than other systems. Its flexibility invites telephones, emails, and fax, web and computer actions to function together.
3. Your organization is in the testing phase of a new accounting application and he needs to verify functionality on various operating systems before deploying it to the customers, but is dealing with hardware availability issues. What network design component would suggest in this scenario?
I would suggest for ERP for it is accounting software highly integrated. Purposefully, it is more productive hence enhances its efficiency.
Activity 4-5
1. Why should organizations invest in data security?
Success of a business depends on data security
Organization’s data is the core of its business. Personal information, employee credentials, and sensitive files are kept on a company’s network. Therefore, the security backup system should be deployed. The system helps businesses to run smoothly even in case of hardware fail.
2. What data encryption method should you implement when you need to send data for the company’s annual earnings report as an attachment in an email from your mobile device to the board of directors of your organization?
Symmetric encryption should be implemented .Here, a common key is used to encrypt and decrypt a message.
3. How can data leakage affect your organization, and how could it be prevented?
Withdrawals by other partners
Business partners may choose to leave the company. Several employees, however, may get scrutinized from their job. Also, it invites significant financial losses. Unfortunately, it drives organizations into the enormous risk that hinders successful continuity of a business.
Security measures should be assigned to curb these risks. Intrusion detection software should be installed so as to monitor any malicious suspected program.
Paloalto. (2015). Retrieved from
Technet. (2015). Retrieved from Read More
Cite this document
  • APA
  • MLA
(“CIS 21 U2 Review Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS 21 U2 Review Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(CIS 21 U2 Review Essay Example | Topics and Well Written Essays - 250 Words)
CIS 21 U2 Review Essay Example | Topics and Well Written Essays - 250 Words.
“CIS 21 U2 Review Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Bono and the U2 Band

...the Beatles’ “Helter Skelter.”After taking some time off, the band reconvened in 1990 in East Berlin to begin work on their next studio album. Brian Eno and Daniel Lanois were again tapped to produce. Achtung Baby received stellar reviews and gave those who resisted U2 until this point a reason to jump in the pool. To take advantage of all the enthusiasm, the group set out in 1992 to embark on their American which lasted for than four year (Rosen, 1981). U2’s project Rattle and Rum attempted to exploit a temporal logic that covered a variety of rock standards combined with the writing and recording. This failed eminently and spectacularly and U2 went from being the...
5 Pages(1250 words)Case Study


...CIS With the imagination of the human mind, racing at the speed of light it is quite evident how it affects the field of technology. Because of the fast paced human thought process, new technologies emerge everyday. Implementing these, technologies in the socio sphere of life bring along its own issues. The widespread use of technology in day-to-day business has forced experts to look into its pros and cons with some insight. The past few years have seen new trends emerging, better and efficient ways to communicate on a personal as well as social level. These boast about the enormous amount of data that can be shared. Nevertheless, along with it has come the intriguing question of "how safe is it to share" (Martinelli,...
3 Pages(750 words)Essay

U2: How to Dismantle an Atomic Bomb

...definitely has religious implications. U2 has always been difficult to pigeonhole and has forever eluded definition. With the arrival of “How to Dismantle an Atomic Bomb,” it appears that U2 will continue this trend of redefining themselves and their music. Works Cited Music. (Compact Disc). U2. “How to Dismantle an Atomic Bomb.” Interscope Records. Release date: November 23, 2004. Middlesex A Book in Review Your Name Here Your Affiliation (Class Name) Here Middlesex is not your run of the mill ‘coming of age’ novel. The main character is Cal Stephanides-a third generation Greek American. Due to some familial in...
2 Pages(500 words)Essay

Cis 331

...Icebergs for Kuwait Icebergs for Kuwait Explore the mess by answering the following Questions. What do we know? Freshwater in Kuwait is scarce hence very expensive as stated in Powell and Baker (2010). Desalinating water from sea is quite costly; it requires a lot amount of oil. What can we assume? We will assume that only large towing ships will be rented to carry maximum of 10, 000, 0000. We will also assume that the towing ship can travel at 1, 3, 5 km/hr, iceberg is spherical and melts with a constant radius. What will the results look like? Towing vessel will travel at 5km/hr and the quantity of the iceberg carry from South Pole will be greater than 6,054,466m3. The alternative method will be reasonable and less expensive... for Kuwait...
2 Pages(500 words)Assignment

CIS Homework

...Security Best Practices In order to find out the best practices of the information security, I have visited and explored the websites of Microsoft, Oracle, Cisco, IBM and Intel. I have noticed that all of these organizations have developed their own information security best practices or guidelines; moreover, some of these guidelines are same in all organizations whereas the others are specific to the equipment or technology, they have developed. These organizations have developed information security frameworks, security architectures, information security laws, information security policy, the user training and resource (Oracle, 2005). It is pertinent to mention here that the guidelines and best practices varies with respect... Best...
1 Pages(250 words)Case Study


...Sherry Turkle: Connected, But Alone? Turkle in the show talks about how technology has transformed the manner in which people communicate today. The traditional forms of communication where people used to talk face to face or through phone calls have been replaced by new forms of technology through use of text messages, social networks and emails. According to her, this transformation has led to loss of genuine real life conversation converting people into robot- like machines. She asserts that there are features of real conversation that can never be replaced by the electronic communication. These features are what connect people as social beings. It is through real conversation that one can express their real emotions... Turkle:...
2 Pages(500 words)Essay

CIS 206 U1 Review Assigment

...Computer Sciences and Information Technology Reasons why Linux is Popular Linux is popular because it has unique, as well as powerful features. It can work as a control program for computers. In addition, it is a well-orchestrated family of utility programs and a set of tools, which allow users to connect and use its utilities to build systems and applications (Sobell, 2012). Linux is popular in academia as students can easily understand it. It supports several codes and a rich software development environment. The development of Linux from the time it was UNIX took the effort of universities took the efforts of university and college students to publicize it. Linux also offers more flexible and configuration options... Sciences and...
1 Pages(250 words)Coursework

CIS U2 206 Research Assigment

...CIS U2 206 Research Assignment CIS U2 206 Research Assignment Chad Perrin’s article “Understand basic Unix file permissions” explores the configuration of users, groups, and file or directory permissions in UNIX in an instructive manner. Perrin’s main argument is that one can use the regular file authorization framework for UNIX to improve primary data security (Perrin, 2009). A section of this framework comprises three groups of entities that one can either allow or deny each of them particular authorizations. The entities are owner, group, and world. The owner entity is when every file and its path has an “owner.” The group entity is when one affiliates every file with...
1 Pages(250 words)Coursework


...CIS Part My experience working for an organization offered new insight and practical involvement in theimplementation of a new system. Participating as part of the software design and development and implementation team, both the functional and non-functional requirements for the system had to be gathered for the organization, Virtusa. The organization is a profit oriented tech-firm that was looking to install a new computer system for its clients. The firm in this instantiated example of the project proves that the failure of the project was due to the requirements deficiencies. The practical case problem presented is that of a software corporation called Virtusa which released a software program application for its...
1 Pages(250 words)Essay


... College: Computer Programming Preheat the oven to 350 degrees. In a bowl, cream some butter, brown sugar, and white sugar together. Beat in the pudding mix until it is blended (, n.d). This recipe step exhibits both a sequence and iteration control structures. The first two steps exhibit a sequence control structure while the last step manifests an iterative approach. 2) 1. Database Administrator - Design and operations of a database 2. Help Desk - End-user oriented 3. System Programmer - Improve mainframe performance 4. Network Manager- Set up and manage network 5. System Operator - Day-to-day computer operations C++ Programming Language C++ is a cross-platform, multi-purpose computer programming language... College: Computer ...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic CIS 21 U2 Review for FREE!

Contact Us