Write a minimum 2-page APA formatted essay on how to configure VLAN including trunking.

LANs configuration

As a senior network administrator, you are tasked with training junior network admins on VLANs. Write a minimum 2-page APA formatted essay on how to configure VLAN including trunking. Your essay should be written like a training guide where you are training junior network administrators on how to properly configure VLAN including trunking. Make sure you include commands needed and descriptions on how the commands help make the VLAN functional on an enterprise network. The format should include steps and screenshots so it is easy for someone else to follow.

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance.

Information Technology Question

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762):

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

What do you feel an auditor would most be concerned with during an IT audit? Discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

Research Paper: COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives.

What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

 

Write a program that calculates the total amount of a meal purchased at a restaurant. Calculate the amounts of an 18 percent tip and a 7 percent sales tax.

DISCUSSION ESSAY

Write a program that calculates the total amount of a meal purchased at a restaurant. The program should ask the user to enter the charge for the food, then calculate the amounts of an 18 percent tip and a 7 percent sales tax. Display each of these amounts and the total.

After your read the program directions, for those of you wondering where to start…remember INPUT, PROCESSING, OUTPUT

Design – Think of what variables you will need. Perhaps write them out on scratch paper. Make your variables have MEANINGFUL names so that you know WHY you are creating them and the purpose they will serve.

Below are design instructions. Once you have completed this assignment you will upload the text file with your Python code. Also, in comments put in your repl.it link from browser like you did for program 1.99

MAKE SURE you put Comments at top of program, listing your name, Name of your program, and a brief description of your program.

INPUT SECTION

The program should ask the user to input the charge for food.

PROCESSING SECTION

Your program will calculate the amount for an 18 percent tip and 7 percent sales tax. NOTE: The tip is calculated BEFORE you add in the tax. In other words, if I had a 10.00 charge for food, my tip would be 18% of 10.00, which is 1.80

Tax is ALSO calculated on JUST the amount of food purchased. Again, if I had bought 10.00 worth of food, tax of 7% of 10.00 would be .70 cents

OUTPUT

want 2 digits of precision to the right of decimal point for output

Sample output run is shown below. User input is highlighted in bold

Enter the charge for food: 78.54

Tip: $ 14.14

Tax: $ 5.50

Total: $ 98.17

 

Why would improvements in munitions SCM also improve warfighting readiness? What factors impact the ability to manage the munitions supply chain?

IT at Work Questions

  1. Explain the role of the munitions supply chain.
  2. Discuss how JMC ensures that soldiers receive the highest-quality ammunition, on time, and where needed.
  3. Why would improvements in munitions SCM also improve warfighting readiness?
  4. What factors impact the ability to manage the munitions supply chain?
  5. For the JMC, where does the munitions supply chain start and where does it end?
  6. Is munitions SCM unique, and if so, why? Or, is it similar to the management of any supply chains? Explain your position.

Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

Final Portfolio Project

This assignment is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

Prompt 3 “Green Computing” (2-3 pages):One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link..

 

What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

Research Paper: COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives.

What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

 

Research and analyze the decisions M incident response to determine when it N appropriate to disconnect from the Internet, stay connected and monitor, or attempt to redirect the attacker for further monitoring.

Discussion: Incident Report &Judgement

Home Modules Announcements Syllabus People Grades Office 365 Chat Files
This is a graded discussion: 60 points possible

1. Analyze and assess the importance and relevance of the incident response process and how it ties into network protection and continued operation.

2. Research and analyze the tools that can be used to assist in the incident response process.

COURSE OBJECTIVES

3. Research and analyze the decisions M incident response to determine when it N appropriate to disconnect from the Internet, stay connected and monitor, or attempt to redirect the attacker for further monitoring.

4. Apply computer forensics concepts into the incident response process. Understand the importance of keeping current U the information security community as a method to protect their environment.

5 Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physiml security policy, assessments or troubleshooting procedures.

PROGRAM OBJECTIVES

6.Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity, and availability.

7. Articulate the complexity of and apply thinking skills to how the network and application infrastructure affects technology forensics investigations and incident response procedures.

 

Part 1: Do an Internet search and find an incident report and the steps taken.
Analyze the report and post the analysis to the discussion area. Be sure to provide your source so other students can look it up.

Part 2: Every organization is vulnerable to errors in judgment. This vulnerability can result in dire consequences when an incident occurs.

  • Explain how an incorrect response to an incident can jeopardize crisis management, forensic evidence, and business continuity.
  • Research a current event, within the last year that demonstrates how an organization lacked a correct response and potentially jeopardized the business.
  • Provide your analysis of the information and how it relates to the topic. Be sure to cite your sources.

NOTE: All current event selections must be different from your peers’. Please check below in the discussion arena. Deliverables Submit an original post in the discussion arena below by the due date. Then, respond to 2 other students posts students’ posts by Sunday Remember, this is meant to be a discussion, so add some new information in your replies. Don’t Risk say “that’s coal” or “I agree Be objective, clear, and concise.
NOTE: To receive full credit, original post must be posted by the due date and responding O two peers by the following Sunday is required.

Explain the role of the munitions supply chain. Discuss how JMC ensures that soldiers receive the highest-quality ammunition, on time, and where needed. Why would improvements in munitions SCM also improve warfighting readiness?

IT at Work Questions

  1. Explain the role of the munitions supply chain.
  2. Discuss how JMC ensures that soldiers receive the highest-quality ammunition, on time, and where needed.
  3. Why would improvements in munitions SCM also improve warfighting readiness?
  4. What factors impact the ability to manage the munitions supply chain?
  5. For the JMC, where does the munitions supply chain start and where does it end?
  6. Is munitions SCM unique, and if so, why? Or, is it similar to the management of any supply chains? Explain your position.

Create a sample MIB tree using Word, PowerPoint, or save as PDF from another software package.

Assignment MIB

Instructions
Create a sample MIB tree using Word, PowerPoint, or save as PDF from another software package.

The MIB tree must have at least 15 elements.

It can be modeled, but not copied from multiple vendor’s example MIBs.

The iso – std – member-body-org-dod-internet-directory-mgmt parts of the tree do not count as part of the 15 elements.