0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
3 Ansichten1 Seite
This document contains instructions for a worksheet assignment in a web server management course. It lists 6 questions that are due on November 21, including questions about determining if a website is at risk of a cyberattack, researching proxy servers and choosing the best one for medium-sized companies, determining if local networks use DMZs and why, ways proxy servers could pose risks, explaining the TCP three-way handshake, and researching OS hardening procedures for Windows and choosing the most appropriate one.
This document contains instructions for a worksheet assignment in a web server management course. It lists 6 questions that are due on November 21, including questions about determining if a website is at risk of a cyberattack, researching proxy servers and choosing the best one for medium-sized companies, determining if local networks use DMZs and why, ways proxy servers could pose risks, explaining the TCP three-way handshake, and researching OS hardening procedures for Windows and choosing the most appropriate one.
This document contains instructions for a worksheet assignment in a web server management course. It lists 6 questions that are due on November 21, including questions about determining if a website is at risk of a cyberattack, researching proxy servers and choosing the best one for medium-sized companies, determining if local networks use DMZs and why, ways proxy servers could pose risks, explaining the TCP three-way handshake, and researching OS hardening procedures for Windows and choosing the most appropriate one.
Questions are due at the beginning of class November 21.
1. In what way, could an administrator determine if their web site may be
poised for a cyberattack? (4) 2. Research the available proxy servers. Given its cost and features which proxy would be appropriate for a medium sized company with moderate security needs? (4) Be prepared to defend your choice. (4) 3. Talk to a few local network administrators. Determine if DMZs have been deployed locally. Ask the administrator why or why not. (4) 4. In what ways, could Proxy servers pose a risk to a companys secure communications? 5. Explain the TCP three-way hand shake. (4) 6. Research OS hardening procedures for Windows clients and servers. Explain which of the researched procedures in your opinion is the most appropriate. (6)