ALL >> Computer-Programming >> View Article
Designing A Safe Client Infrastructure
In this activity, you must use what you learned in both lessons and apply CompTIA A+ Practical Application to a real-world situation. Read the scenario and then complete the exercises that follow. You can find answers for the exercises in the "Questions and Answers" section at the end of this chapter.
Scenario
Wide World Importers is going to provide sales personnel with mobile devices instead of laptops for remote communication with sales offices. Sales personnel "will be able to send and receive e-mail and use a custom application to access sales catalogs, review customer information, discover order status, and place new orders. The application has not been developed yet. As the security administrator, you must begin the process of designing a secure client infrastructure for this project. While beginning your preliminary research, you also find areas where remote access security can be improved. You have the following information to work with.
Wide World Importers is a wholesale provider of toys and gifts, with offices in Tokyo, New York, San Francisco, Zurich, ...
... and Hamburg. Sales continue to grow, and Wide World Importers believes this is because of its personal CompTIA Security+ Exam approach. Although customers have full access to on-line ordering and order tracking, most sales are entered by sales personnel, who visit major customers on a regular basis.
Data centers in each location store product information. Customer data is regionalized, but catalog contents are replicated worldwide. Current remote access connections are provided for dial-up and Internet access via Microsoft Routing and Remote Access Services and Internet Authentication Services. Sales, marketing, and management person?nel use Windows 2000 and Windows XP Professional laptop computers to access the data center.
Dial-in Constraints: Select the Allow Access Only Through These Media (NAS-Port-Types) check box, and then select the Virtual (VPN) check box.
Encryption: Deselect all check boxes except Strongest Encryption (MPPE 128 bit).
Advanced page: The Ignore-User-Dialin-Properties attribute is set to False or not configured. (The requirement to verify the user's phone number will be evaluated.) User account Dial-in Properties: Set these properties to Control Access Through Network+ certification Remote Access Policy.
Add Comment
Computer Programming Articles
1. Spark Matrix™: Data Intelligence PlatformsAuthor: Umangp
2. Golang Tutorial Explained: From Basics To Real-world Use
Author: Tech Point
3. Nodejs Tutorial: A Complete Beginner’s Guide To Learn Node.js Step By Step
Author: Tech Point
4. Angularjs Tutorial For Beginners And Professionals With Simple Examples
Author: Tech Point
5. Google Cloud Platform Tutorial: Step-by-step Introduction To Google Cloud
Author: Tech Point
6. Microsoft Azure Tutorial: A Beginner’s Guide To Cloud Computing With Azure
Author: Tech Point
7. How Thoughtful Web Development Improves User Experience And Business Trust
Author: Ramesh Roy
8. Git Tutorial: A Beginner’s Guide To Version Control And Git Basics
Author: Tech Point
9. Machine Learning Tutorial Explained Simply For Students And Beginners
Author: Tech Point
10. How Ai Is Transforming Logistics Software Development
Author: Chudovo
11. Top Seo Companies In Dubai For 2025
Author: webtek Digital
12. Hadoop Tutorial Step By Step: Learn Hadoop Basics To Advanced Concepts
Author: Tech Point
13. Data Science Tutorial From Scratch: Learn Data Science Step By Step
Author: Tech Point
14. Data Science With Python: Best Computer Course For Career
Author: TCCI - Tririd Computer Coaching Institute
15. Magento Web Development Agency: Empowering Brands With Scalable And Smart E-commerce Solutions
Author: Web Panel Solutions






