SlideShare a Scribd company logo
The midterm test assignment is as follows:
Your company has assigned you the task of evaluating its
computer networks. You are to write a APA formatted
document covering 15 points on which you will evaluate the
technology, connectivity, and functioning of the company’s
computer networks.
Briefly state each area you will evaluate AND NUMBR IT 1-
15 (one line of text – bold). Follow that by two paragraphs
explaining how you conduct the evaluation.
Example:
Evaluation of Network security technology and procedures
.
Review of past and recent security incidents will be conducted
when and if information is available and impact of incident will
be analyzed. Review of technology now deployed including
firewalls, antivirus software, password protection, intrusion
detection, and back-up management. Installed software will be
evaluated for effectiveness and compared to industry standards
and best practices for network security. Version control and
updates for all software packages will be reviewed. In addition,
documented security procedures will be evaluated and compared
to best practices.
SUBMIT YOUR ASSIGNMENT AS A APA FORMATTED
DOC ATTACHMENT.

More Related Content

DOCX
Many companies and agencies conduct IT audits to test and assess the.docx
DOC
Cst 630 Inspiring Innovation--tutorialrank.com
DOCX
CST 630 Effective Communication - snaptutorial.com
DOCX
CST 630 Exceptional Education - snaptutorial.com
DOCX
Cst 630Education Specialist / snaptutorial.com
PDF
Cst 630 Believe Possibilities / snaptutorial.com
DOC
Cst 630 Extraordinary Success/newtonhelp.com
DOC
Cst 630 Education is Power/newtonhelp.com
Many companies and agencies conduct IT audits to test and assess the.docx
Cst 630 Inspiring Innovation--tutorialrank.com
CST 630 Effective Communication - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com

Similar to The midterm test assignment is as followsYour company has assigne.docx (20)

DOC
Cst 630 Motivated Minds/newtonhelp.com
DOC
Cst 630 Enhance teaching / snaptutorial.com
PDF
Cst 630 Education Organization-snaptutorial.com
DOCX
CST 630 RANK Redefined Education--cst630rank.com
PDF
CST 630 RANK Remember Education--cst630rank.com
DOCX
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
DOCX
CST 630 RANK Achievement Education--cst630rank.com
DOCX
CST 630 RANK Educational Specialist--cst630rank.com
PDF
CST 630 RANK Become Exceptional--cst630rank.com
PDF
CST 630 RANK Introduction Education--cst630rank.com
DOCX
CST 630 RANK Inspiring Innovation--cst630rank.com
DOCX
Project 1CST630 Project ChecklistStudent Name DateNote This che
DOCX
ISE 620 Final Project Guidelines and Rubric Overview .docx
PPT
Isms3
PPT
computer security audit ,erp audit,software systems audit
DOCX
Wk 6 - Security AuditYou are part of a team selected by the Chie.docx
PDF
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
PPTX
IT environment analytics service
DOCX
Key AssignmentThe management team as well as your peers are happy .docx
PDF
Your company has taken a proactive approach to cybersecurity by ensuri.pdf
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
Project 1CST630 Project ChecklistStudent Name DateNote This che
ISE 620 Final Project Guidelines and Rubric Overview .docx
Isms3
computer security audit ,erp audit,software systems audit
Wk 6 - Security AuditYou are part of a team selected by the Chie.docx
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
IT environment analytics service
Key AssignmentThe management team as well as your peers are happy .docx
Your company has taken a proactive approach to cybersecurity by ensuri.pdf
Ad

More from mallisonshavon (20)

DOCX
The objectives of this exercise are to1) Gain further experience .docx
DOCX
The objectives of this exercise are to1) Gain experience with usi.docx
DOCX
The objectives of this assignment are to1)Gain further unde.docx
DOCX
The Odyssey Discussion Activity - Guiding an Individual or Social.docx
DOCX
The objectives of this exercise are to1) Gain further experienc.docx
DOCX
The objectives of this assignment are to1)Gain experience using.docx
DOCX
The objective of this weeks deliverable is to provide Robert M. Lop.docx
DOCX
The number of American telecommuters is expected to increase by 29 m.docx
DOCX
The number of children through adolescence with SED (severe and impa.docx
DOCX
The NPR Analysis has a fivefold purpose. Experience National Publi.docx
DOCX
The normal curve is the shape that represents how variables are dist.docx
DOCX
the nine properties of life. Briefly describe each of the nine prope.docx
DOCX
The NTSB frequently recommends safety improvements for the US airlin.docx
DOCX
The nobleman Hugh of Lusignans account of his dealings with his lor.docx
DOCX
The National Association for the Education of Young Children (NAEYC).docx
DOCX
The movie I  chose is FIREPROOFi have attached the document with.docx
DOCX
The Monroe Doctrine became one of the crucial foundations of America.docx
DOCX
The Movie I would like to analyze is ____________________ .Your An.docx
DOCX
The motion picture industry is a competitive business. More than 50 .docx
DOCX
The Moore-Thomas, Day-Vines article explores cultural competence as .docx
The objectives of this exercise are to1) Gain further experience .docx
The objectives of this exercise are to1) Gain experience with usi.docx
The objectives of this assignment are to1)Gain further unde.docx
The Odyssey Discussion Activity - Guiding an Individual or Social.docx
The objectives of this exercise are to1) Gain further experienc.docx
The objectives of this assignment are to1)Gain experience using.docx
The objective of this weeks deliverable is to provide Robert M. Lop.docx
The number of American telecommuters is expected to increase by 29 m.docx
The number of children through adolescence with SED (severe and impa.docx
The NPR Analysis has a fivefold purpose. Experience National Publi.docx
The normal curve is the shape that represents how variables are dist.docx
the nine properties of life. Briefly describe each of the nine prope.docx
The NTSB frequently recommends safety improvements for the US airlin.docx
The nobleman Hugh of Lusignans account of his dealings with his lor.docx
The National Association for the Education of Young Children (NAEYC).docx
The movie I  chose is FIREPROOFi have attached the document with.docx
The Monroe Doctrine became one of the crucial foundations of America.docx
The Movie I would like to analyze is ____________________ .Your An.docx
The motion picture industry is a competitive business. More than 50 .docx
The Moore-Thomas, Day-Vines article explores cultural competence as .docx
Ad

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Lesson notes of climatology university.
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Computing-Curriculum for Schools in Ghana
PDF
RMMM.pdf make it easy to upload and study
PDF
Complications of Minimal Access Surgery at WLH
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
Classroom Observation Tools for Teachers
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
GDM (1) (1).pptx small presentation for students
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Lesson notes of climatology university.
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Computing-Curriculum for Schools in Ghana
RMMM.pdf make it easy to upload and study
Complications of Minimal Access Surgery at WLH
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Final Presentation General Medicine 03-08-2024.pptx
O7-L3 Supply Chain Operations - ICLT Program

The midterm test assignment is as followsYour company has assigne.docx

  • 1. The midterm test assignment is as follows: Your company has assigned you the task of evaluating its computer networks. You are to write a APA formatted document covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company’s computer networks. Briefly state each area you will evaluate AND NUMBR IT 1- 15 (one line of text – bold). Follow that by two paragraphs explaining how you conduct the evaluation. Example: Evaluation of Network security technology and procedures . Review of past and recent security incidents will be conducted when and if information is available and impact of incident will be analyzed. Review of technology now deployed including firewalls, antivirus software, password protection, intrusion detection, and back-up management. Installed software will be evaluated for effectiveness and compared to industry standards and best practices for network security. Version control and updates for all software packages will be reviewed. In addition, documented security procedures will be evaluated and compared to best practices. SUBMIT YOUR ASSIGNMENT AS A APA FORMATTED DOC ATTACHMENT.