0% found this document useful (0 votes)
24 views

Question 1 Answers - Edited

The document discusses network configuration and security. It addresses how system administrators manage networks and ensure security through factors like certificates, user education, and physical security strategies. Common certificates issued include Cisco, Amazon Web, and Google Cloud certificates, which bind public keys to servers. System administrators should use secure certificates and servers, such as those from Bluehost, Google Cloud, Amazon Cloud, and Alibaba Cloud, to prevent hacking and store information securely. IP configuration is also important, allowing communication between web servers and networks through protocols like HTTP. Firewalls further control network traffic and security.

Uploaded by

Gifted Maggie
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Question 1 Answers - Edited

The document discusses network configuration and security. It addresses how system administrators manage networks and ensure security through factors like certificates, user education, and physical security strategies. Common certificates issued include Cisco, Amazon Web, and Google Cloud certificates, which bind public keys to servers. System administrators should use secure certificates and servers, such as those from Bluehost, Google Cloud, Amazon Cloud, and Alibaba Cloud, to prevent hacking and store information securely. IP configuration is also important, allowing communication between web servers and networks through protocols like HTTP. Firewalls further control network traffic and security.

Uploaded by

Gifted Maggie
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1

Network configuration assignment

Student’s name

University

Professor

Course

Date
2

Network configuration assignment

Question 1 answers

System administrators have several roles in running information systems, and they are

responsible for troubleshooting, installing new software, managing the network, and ensuring the

system's security. The security of information systems is determined by factors such as

certificates implemented, users' education, the physical strategy implemented, and threats

received. The certificate is becoming a popular method to provide security to data stored in

information systems (Li & Liu, 2021). Certificates in our unique digital representation of data,

which has the public key, names, and identities, are issued by the certificate authority, commonly

used certificates are Cisco certificates, Amazon web certificates, and Google cloud certificates.

Certificates keys are responsible for binding the public to the server. System administrators

should use to secure certificates such as Sisco to prevent servers from being compromised by

hackers. System administrators should use secure and cheap servers to store information. Servers

such as Bluehost, google cloud, amazon cloud, and Alibaba cloud are cheap and highly secure,

thus suitable for business hosting. (Li & Liu, 2021)

Question 2 answers

The Internet is the connection of several computers on the same network. Faster Internet

is efficient and more reliable when connected to a server. Web servers use hypertext transfer

protocol to communicate with websites or other servers through the Internet or intranet. To speed

up server traffic, servers such as the Apache traffic server should be deployed. Apache is a faster

web-based server that supports HTTP 1 and 2 (Li & Liu, 2021).
3

Question 3 answers

Webservers are software that responds to clients' requests from the world wide web

using protocols such as HTTP. Networks are configured to web servers through unique

configuration scripts such as password, Hostname, client ID, and administrative ports. This

configuration communicates through a specific path that initiates the smooth running of all

internet protocols, which is called IP configuration. IP address configuration configures internet

protocol between webs servers and network protocol this is to allow IP sockets to send and

receive data (West & White, 2023). At a time, HTTP may experience traffic this traffic is

analyzed by HTTP traffic analysis using cookies, it's relevant to prevent and reduce HTTP traffic

to increase the speed of the web server. Firewall control and filter all traffic in the network

system; hence they are also responsible for controlling traffic in HTTP (West & White, 2023).

Question 4 answers

When setting up internet access for your information system network, factors such as

internet users on the network, Internet speed, and IP address used by the Internet should be

considered. Internet service providers (ISP) are companies that provide internet services and are

also responsible for allocating an IP address to clients, either private IP (used in the internal

network) or public IP (used to connect the system to the Internet) address. (West & White, 2023)

The IP address can also be used to configure a public webserver to allow several users to share or

access the Internet within the same network. Proxy servers are intermediate between users and

web servers, and they use the IP address to access the server when users request (West & White,

2023).

Question 5 answers
4

An IP address has many benefits, such as allowing users to configure servers with VPN

and FTN, which provides additional security to the information system when users access the

Internet (West & White, 2023). The visible IP address is not recommended because it is

vulnerable to hackers and malicious software on the Internet, also, visible networks encounter

many problems, such as technical challenges and malfunctions when connected to the external

network.

Reference

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security;

Emerging trends and recent developments. Energy Reports, 7(7), 8176–8186.

ScienceDirect. https://doi.org/10.1016/j.egyr.2021.08.126

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy