Need Help ?

Home >> Samples >> CYB 310 Network Defense >> CYB 310 : 6-1 Project One Submission: Network Evaluation Report

CYB 310 : 6-1 Project One Submission: Network Evaluation Report ...


CYB 310 : 6-1 Project One Submission: Network Evaluation Report

Network Evaluation Report

Overview

How do you become good at any skill? You practice it over and over until it becomes second nature. Troubleshooting computer and network problems is a skill that evolves over your career. As you practice identifying and troubleshooting network issues, you will become really good at finding problems and developing solutions. These skills are a critical component of systems thinking and the adversarial mindset.

Cybersecurity analysts and network engineers work side by side to build the strongest network defense possible. As a security analyst, you might be asked to help with network protection from time to time. Your ability to understand and troubleshoot emerging problems is key to protecting a system.

For this project, you will assume the role of a job candidate. As part of the interview process, you are asked to troubleshoot hypothetical issues in a network. You will create a network evaluation report that documents your findings for the interviewers.

The project will be submitted in Module Six.

By completing this assignment, you will demonstrate your mastery of the following competency:

  • Identify and troubleshoot deficiencies related to network security

Scenario

You are interviewing for a cybersecurity analyst position. As part of the interview process, the company tests all candidates’ troubleshooting capabilities. The company provides you with a GNS3 virtual network and asks you to demonstrate your troubleshooting skills. Open the CYB 310 Sandbox environment and click on the GNS3 icon. Open the Project One file to complete the assignment. 

Select two challenges from the list below and provide recommendations for how you would address them.

Challenges:

  1. The PC used for remote access should be designated to the internal file server PC and currently has all access to the entire internal network.
  2. There are no password policy best practices in use, and the users in the network have passwords that never expire.
  3. Users in individual departments can access and log into computers in other departments within the network.

Prompt

You must address the following rubric criteria: 

  1. Network Evaluation Report
    1. Challenge One
      1. Identify the potential cause of the selected challenge.
      2. Explain your approach to resolving the challenge. Justify your response.
    2. Challenge Two
      1. Identify the potential cause of the selected challenge.
      2. Explain your approach to resolving the challenge. Justify your response.





We have an Answer from Expert

View Expert Answer

Expert Answer


Answer: CYB 310 : 6-1 Project One Submission: Network Evaluation Report

We have an Answer from Expert

Buy This Answer $5

Need your Own Custom Solution?

Order with full confidence and you will be amazed by our results

It’s pretty straightforward, but if you get stuck at any step, please feel free to contact us at any time for a chat.

WhatsApp support@gradegivers.com

NEED A UNIQUE PAPER ON THE ABOVE DETAILS?
Order Now
WhatsApp