Question 1 Answers - Edited
Question 1 Answers - Edited
Student’s name
University
Professor
Course
Date
2
Question 1 answers
System administrators have several roles in running information systems, and they are
responsible for troubleshooting, installing new software, managing the network, and ensuring the
certificates implemented, users' education, the physical strategy implemented, and threats
received. The certificate is becoming a popular method to provide security to data stored in
information systems (Li & Liu, 2021). Certificates in our unique digital representation of data,
which has the public key, names, and identities, are issued by the certificate authority, commonly
used certificates are Cisco certificates, Amazon web certificates, and Google cloud certificates.
Certificates keys are responsible for binding the public to the server. System administrators
should use to secure certificates such as Sisco to prevent servers from being compromised by
hackers. System administrators should use secure and cheap servers to store information. Servers
such as Bluehost, google cloud, amazon cloud, and Alibaba cloud are cheap and highly secure,
Question 2 answers
The Internet is the connection of several computers on the same network. Faster Internet
is efficient and more reliable when connected to a server. Web servers use hypertext transfer
protocol to communicate with websites or other servers through the Internet or intranet. To speed
up server traffic, servers such as the Apache traffic server should be deployed. Apache is a faster
web-based server that supports HTTP 1 and 2 (Li & Liu, 2021).
3
Question 3 answers
Webservers are software that responds to clients' requests from the world wide web
using protocols such as HTTP. Networks are configured to web servers through unique
configuration scripts such as password, Hostname, client ID, and administrative ports. This
configuration communicates through a specific path that initiates the smooth running of all
protocol between webs servers and network protocol this is to allow IP sockets to send and
receive data (West & White, 2023). At a time, HTTP may experience traffic this traffic is
analyzed by HTTP traffic analysis using cookies, it's relevant to prevent and reduce HTTP traffic
to increase the speed of the web server. Firewall control and filter all traffic in the network
system; hence they are also responsible for controlling traffic in HTTP (West & White, 2023).
Question 4 answers
When setting up internet access for your information system network, factors such as
internet users on the network, Internet speed, and IP address used by the Internet should be
considered. Internet service providers (ISP) are companies that provide internet services and are
also responsible for allocating an IP address to clients, either private IP (used in the internal
network) or public IP (used to connect the system to the Internet) address. (West & White, 2023)
The IP address can also be used to configure a public webserver to allow several users to share or
access the Internet within the same network. Proxy servers are intermediate between users and
web servers, and they use the IP address to access the server when users request (West & White,
2023).
Question 5 answers
4
An IP address has many benefits, such as allowing users to configure servers with VPN
and FTN, which provides additional security to the information system when users access the
Internet (West & White, 2023). The visible IP address is not recommended because it is
vulnerable to hackers and malicious software on the Internet, also, visible networks encounter
many problems, such as technical challenges and malfunctions when connected to the external
network.
Reference
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security;
ScienceDirect. https://doi.org/10.1016/j.egyr.2021.08.126