Information Technology
Two different Discussions
Discussion one:
Discuss ONE of the Following Topics:
Attack monitoring can be used to overcome problems in your system. What type of monitoring is beneficial and are there any limits you need to worry about? Is attack monitoring useful? Are there any drawbacks or shortcomings that could leave you vulnerable?
What does “Layer 2” refer to and how is a Layer 2 attack carried out? How dangerous is this type of attack? Where does this take place and in today’s network, is it very common?
How dangerous is an untrained user in your company? What damage could possibly be done that you have seen happening by an untrained user? Whose responsibility is it to train/watch those individuals?
Whose job is it to identify vulnerabilities? Should it be everyone’s job? If so, how would everyone carry this task out?
Name a vector or pathway for a specific attack as discussed in the text. Give an example. Why is it important to know these vectors/pathways?
Discussion # Two
Discussion:
A question/comment about Server form factors: Differences between Rack Mounted, Towers, and Blade Servers and your experiences with each.
A question/comment about CPU performance and the different metrics used to determine how well a CPU works for your system. Discuss your preference and experience with different CPUs or instances where you had to change a CPU and any issues that came up.
A question/comment about Memory: Your experience with Server memory and any issues that came up when you had to add additional modules.
A question/comment about creating a safe Server environment: What has to be built to house the number of Servers that your company needs? Explain your setup (or a company you know) and what safety guards are in place to make sure the Servers maintain adequate production.
USE APA FORMAT PLZ
ADD REFERNCES TO SUPPORT YOUR ANSWERS