Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
Check Instructions
Style:
Other
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Networking Discussion Questions

Essay Instructions:

DISCLAIMER: These are discussion questions and just need to be answered in a paragraph or 2
Please respond to the following
1.As you know, a Windows 2016 Server installation supports many roles for you to employ. You can turn them on and off by using checkboxes in the “Add Roles and Features Wizard.”
Given the ease of selecting roles for your server, do you think you should install all the roles so that you are prepared for any contingency? Why or why not?
2.Please respond to the following:
Everything we do with a computer leaves a footprint. In a few sentences, explain any tools you have learned about that are included in the Microsoft Windows operating system to review these digital marks. If you haven’t found any, do some research and return here before posting your initial reply. What is your favorite Linux-based tool (or tools) that allow us to monitor processes in a Linux System? How do you think the information collected from these tools assist us in a malware case? Can you recommend any other tools, either within the OS or from the Internet, that can be used to explore events and logs? Share with your classmates, and provide links to any useful resource you find.
(Note: For citing Internet sources in your discussion, please see the Web Sources section of the Strayer Writing Standards guide available in the left-hand menu.)
In Linux, how much information can be gained from viewing the BASH history?
Please respond to the following
3. Setting up your server with the correct storage media can be critical to your network's performance.
When it comes to your server’s storage capabilities for the OS itself, what would you choose to implement?
Please respond to the following
4.Examine WinHex and the Sleuth Kit and Autopsy at Open Source Digital Forensics. In a few sentences, describe a scenario when you might find a use for each of these tools. Is one tool preferred more than the others in this industry? Why do you think learning these tools is important? Using the Internet, recommend a website or video that provides a tutorial on how to best use one of the three tools. Share with your classmates and provide links to any useful resource you find.
In your research, are there any other tools that can be used to perform the same tasks? Have you used them? Do you like them better or not as much?
5.Windows 2016 Server supports the use of Hyper-V. Hyper-V is a role you can install to create what are known as virtual machines or VMs.
What do you think are some interesting kinds of things a VM can do to allow you to expand the functionality of your network?
6.Please respond to the following:
What do you believe was the original purpose of steganography tools and how have criminals used them to their advantage? Share some steganography tools you’ve found on the Web with your classmates and provide links to any useful resource you find. Describe in a few sentences how you might use these tools for good, and how they might be used for nefarious purposes.
(Note: For citing Internet sources in your discussion, please see the Web Sources section of the Strayer Writing Standards guide available in the left-hand menu.)
Search the Internet and find a free steganography tool. Post your link and provide a brief explanation on how the tool is used

Essay Sample Content Preview:

Networking Discussion Questions
Student Full Name
Institutional Affiliation
Course Full Title
Instructor Full Name
Due Date
Networking Discussion Questions
Question 1
I believe that installing all the Windows 2016 Server installation roles is necessary to prepare for any contingency. By installing all roles, one can apply various utilization types of the server and utilize the same for numerous use cases from filing to printing to using the web. Installing all tasks allows one to attend to an emergency task without the inconvenience of returning to the server manager to alter roles and features: installing all roles provides a management environment where multiple roles can be performed promptly. However, the server may be a tide slower.
Question 2
I did not manage to find any tools included in the Microsoft Windows operating system to review digital marks. However, my favorite Linux-based tool that allows me to monitor processes in a Linux system is top. The top is a powerful utility tool that provides useful data about the running system, including memory usage, a list of running processes such as CPU time and memory consumed by each process, as well as CPU loads. I also like the system monitoring tool because it displays a great deal of system information in real-time and the display of data columns is interactive. The information collected by these tools assists users in a malware case because one can recognize unusual activity and malicious processes in Linux (Kili, 2018). The tool is critical to identifying any disruptions or manipulation in the device’s normal operation. I recommend that some tools from the Internet explore events and logs are SolarWinds Papertrail (/) and Paessler PRTG Network Monitor (/website-monitoring). The information one can gain from viewing the BASH history includes all commands that have been executed hitherto by the user even after restarting the system.
Question 3
The commands are listed starting with the first command to the very recent one and customized to the user’s needs. I would choose to implement t...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These Other Essay Samples: