{"id":26557,"date":"2024-05-23T13:32:25","date_gmt":"2024-05-23T13:32:25","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/summative-assessment-network-defense-fundamentals-control-protocols-and-threat-reports\/"},"modified":"2024-05-23T13:32:25","modified_gmt":"2024-05-23T13:32:25","slug":"summative-assessment-network-defense-fundamentals-control-protocols-and-threat-reports","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/summative-assessment-network-defense-fundamentals-control-protocols-and-threat-reports\/","title":{"rendered":"Summative Assessment: Network Defense Fundamentals Control, Protocols, and Threat reports"},"content":{"rendered":"<div style=\"font-size: 14px; cursor: auto; color: inherit;\">\n<h2 style=\"margin-right: 0px; margin-bottom: 0.875rem; margin-left: 0px; font-size: 1.125rem; line-height: 1.4; cursor: auto;\">Exam Content<\/h2>\n<\/div>\n<section style=\"font-size: 14px; cursor: auto; color: inherit;\" aria-labelledby=\"\">\n<ol style=\"font-size: 0.875rem; line-height: 1.6; cursor: auto; color: inherit;\">\n<li style=\"margin: 0px 0px 1.25rem; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"line-height: inherit; cursor: auto; color: inherit;\">\n<div style=\"line-height: inherit; cursor: auto; color: inherit;\">\n<div style=\"margin: 0px 0px 0.9375rem; font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\">\n<div style=\"line-height: inherit; cursor: auto; color: inherit;\" data-gramm=\"false\">\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\">Imagine you oversee cybersecurity operations for a major online sales company. It\u2019s imperative that you have the most effective cybersecurity measures available at your disposal. Resolution after an attack has occurred is not a viable solution. So, your job is to make sure an attack never occurs. Recalling the fundamental goals, benefits, challenges, and counter measures you\u2019ve learned so far:<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\"><br style=\"line-height: inherit; cursor: auto; color: inherit;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; line-height: inherit; cursor: auto; color: inherit;\">Create&nbsp;<\/strong>a 2- to 3-page MS-Word report for your company, detailing the following:<\/p>\n<ul style=\"padding: 0px 3rem 0px 1.5rem; font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\">\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto; color: inherit;\">Identify one potential network threat to your business.<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto; color: inherit;\">Recommend 2 controls or protocols that need to be implemented to defend against attacks and limit the risk you identified for your business.<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto; color: inherit;\">Describe 2 purposes of the controls or protocols you recommended for your business. For each, list 1 example where these controls or protocols were used in businesses. What did they protect against?<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto; color: inherit;\">Discuss 1 significance of using OSI, TCP\/IP, and SANS 20 Controls in network protection.<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto; color: inherit;\">Name one control and protocol you find in a security policy.<\/li>\n<\/ul>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\"><br style=\"line-height: inherit; cursor: auto; color: inherit;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; line-height: inherit; cursor: auto; color: inherit;\">Cite&nbsp;<\/strong>any sources to support your assignment.<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\"><br style=\"line-height: inherit; cursor: auto; color: inherit;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; line-height: inherit; cursor: auto; color: inherit;\">Format&nbsp;<\/strong>your citations according to APA guidelines.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Exam Content Imagine you oversee cybersecurity operations for a major online sales company. It\u2019s imperative that you have the most effective cybersecurity measures available at your disposal. Resolution after an attack has occurred is not a viable solution. So, your job is to make sure an attack never occurs. Recalling the fundamental goals, benefits, challenges, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/26557"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=26557"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/26557\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=26557"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=26557"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=26557"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=26557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}