123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Designing A Safe Client Infrastructure

Profile Picture
By Author: Jasmine
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this activity, you must use what you learned in both lessons and apply CompTIA A+ Practical Application to a real-world situation. Read the scenario and then complete the exercises that follow. You can find answers for the exercises in the "Questions and Answers" section at the end of this chapter.
Scenario
Wide World Importers is going to provide sales personnel with mobile devices instead of laptops for remote communication with sales offices. Sales personnel "will be able to send and receive e-mail and use a custom application to access sales catalogs, review customer information, discover order status, and place new orders. The application has not been developed yet. As the security administrator, you must begin the process of designing a secure client infrastructure for this project. While beginning your preliminary research, you also find areas where remote access security can be improved. You have the following information to work with.

Wide World Importers is a wholesale provider of toys and gifts, with offices in Tokyo, New York, San Francisco, Zurich, ...
... and Hamburg. Sales continue to grow, and Wide World Importers believes this is because of its personal CompTIA Security+ Exam approach. Although customers have full access to on-line ordering and order tracking, most sales are entered by sales personnel, who visit major customers on a regular basis.

Data centers in each location store product information. Customer data is regionalized, but catalog contents are replicated worldwide. Current remote access connections are provided for dial-up and Internet access via Microsoft Routing and Remote Access Services and Internet Authentication Services. Sales, marketing, and management person?nel use Windows 2000 and Windows XP Professional laptop computers to access the data center.
Dial-in Constraints: Select the Allow Access Only Through These Media (NAS-Port-Types) check box, and then select the Virtual (VPN) check box.
Encryption: Deselect all check boxes except Strongest Encryption (MPPE 128 bit).
Advanced page: The Ignore-User-Dialin-Properties attribute is set to False or not configured. (The requirement to verify the user's phone number will be evaluated.) User account Dial-in Properties: Set these properties to Control Access Through Network+ certification Remote Access Policy.

Total Views: 304Word Count: 344See All articles From Author

Add Comment

Computer Programming Articles

1. Which Are The Best Java Coding Classes In Bhopal?
Author: Shankar Singh

2. Warehouse Management In Zambia: Essential Features To Look For
Author: Doris Rose

3. Ecommerce Web Design And Development In Melbourne With The Merchant Buddy
Author: themerchantbuddy

4. Why Website Maintenance Is Crucial For Business Success
Author: Yogendra Shinde

5. Boost Your Business With Smart Invoice Pos Software In Zambia
Author: Cecilia Robert

6. How Stablecoin Development Ensures Stability And Security?
Author: Michael noah

7. Công Cụ Tính Chiều Cao Chuẩn Từ Minbin Tool: Đo Lường Và Cải Thiện Chiều Cao Hiệu Quả
Author: KenJi123

8. How To Make A Courier App For Courier Delivery And Tracking Service
Author: Deorwine Infotech

9. Reputation Management In The Digital Age: Protecting And Enhancing Your Law Firm’s Image
Author: jamewilliams

10. What Features Should I Look For In Wordpress Ecommerce Plugins?
Author: Rocket Press

11. Staying Updated With The Latest Gaming News
Author: Next Tech Plus

12. Game Development: Evolving Technologies And New Horizons
Author: Rick John

13. Why Svelte Is The Most In-demand Framework For Web Development?
Author: Why Svelte Is The Most In-Demand Framework For Web

14. Maximizing Ebay Sales With Maropost/neto And Pursuit Info Solutions
Author: rachelvander

15. The Importance Of Software Testing: Ensuring Quality In Development
Author: John Mathew

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: