Questions: TASK DESCRIPTIONThis assessment comprises of 2 parts. The first part is the practical work. You have to complete all the practical tasks and document them with the necessary screenshots. The second part is an Observational work. You have to record your observations about the practical tasks completed. The details on completing both parts of the assessment are given below. Part 1: Practical WorkYou are required to build, deploy, confi...
Identifying Legal Information FlowsYour company has three major divisions, headquarters (HQ), factory (F) and a retail outlet (R), at three different sites. They all have connection to the public Internet, and to save money, the company has decided to rely on public infrastructure to connect the sites. Your task is to design a secure communication network between those sites. The retail outlet also has an on-line department that sells pro...
Task 1: Network DesignsYour line manager wants you to provide detailed network designs for the primary and secondary business sites of the company using the provided office floor plans as a guide. The customer has provided the following specifications for the network. Network Specifications: Primary business site • Office 1 should be used as the Communication Room (comms room) • There should be at least 15 workstations which must in...
Task 1 [15 marks]Following a web application penetration testing engagement you have identified the following issues. You must complete the issue justification/explanation/CVEs/Vurnerability type as required and write appropriate recommendations for addressing each of the issues identified. You will need to conduct research on the nature and implications of these issues in order to complete the justification/explanation and recommendati...
Task: AimComputation and allocation of IP addresses to devices in a computer network (based on a given block address), followed by design and simulation of the network using Cisco Packet Tracer software. Task Analysis and Design of the Logical NetworkCompute and determine the Network Address, Address Mask, Subnetting and other addresses in Table 2 using the lecture material and information from the recommended textbook as a guide. Task: Using ...
This coursework is designed to demonstrate the broad understanding and knowledge in computing, assessing and evaluating the student’s strength and level of analysis. The coursework should be submitted as one document in a report format in final submission attaching all related evidence in the appendices. In this coursework, you are required to conduct a full project development life cycle from inception of the project and feasibilit...
DeliverablesYou need to choose one topic from the following list and carry out a mini-project. Compare and contrast the differences between one specific IGP (for example, OSPF) and one specific BGP (for example iBGP or eBGP). Compare and contrast the different path decision process between one specific IGP (for example, RIP) and iBGP. Compare and contrast the differences between using BGP in the enterprise core (ALL thre...
Question 1Question 1For this question, you will analyse packets captured during a simple web request from a client PC in a home network to a www.google.com server. In a typical home broadband connection, the router provides a NAT translation service. Client-to-server packets captured by Wireshark on the ISP (WAN) side of the router will have already undergone NAT translation. The Wireshark trace file captured on the ISP side of the home router...
Multipath and Its Impact1. (20 Marks) Note: Word limit for each question part is 150 words excluding references, equations and diagrams. (Total word count – 450) a) In wireless communications, multipath is a common phenomenon that results in radio signals reaching the receiving antenna by two or more paths. Consider an example scenario (Figure below) in which a pair of wireless transmitter and receiver are operating at 2.5 GHz....
Submission and PenaltiesIntroductionIn this assignment you will be building a simplifed replica of the Dropbox cloud service. You will be required to have storage available for users where they can create arbitrary directory structures and can upload files and download files from the service. There should also be some access to some basic file sharing between accounts. It is recommended that the structure of the assignment is closely followed...
AimsTechnology Advancement has resulted in a major increase in social media platforms, as well as a change in how people interact and share information regularly. Social media plays an extremely vital role in users' daily lives because it helps to build explicit networks and build relationships. Social Media Platforms (SMP), also known as Social Networking sites (SNS) are online platforms that deal with the implementation, growth, management...
Question 1 - Penetration Testing on Windows 10 SystemYou are working for a security company that is going to run a pentest on a new company with new computers. It is a small office with 10 employees and no more than 20 devices connected to a managed Cisco switch with the default configuration of all the interfaces up plus any link aggregation. In this exercise, you have to penetrate a full patched Windows 10 system with all service ...
Task: OverviewTest 3 requires you to create a simple network topology and configure packet filtering firewalls using packet tracer. You will not use any reference material. During the quiz Packet tracer must be the only application open on your desktop at any time. If you are found with any other application open it will be treated as an academic offence and you will be assessed a grade of 0 on the quiz. Once you have completed the quiz you wi...
Business profileThe case study will now focus on the impact on the number of servers that early adoption of server virtualization would have had. Below is a recap of the business profile of the company in this case study as well as the core IT services that apply. TradRetail Inc. is a consumer goods retailer with a head office that includes associated production and warehouse facilities. Goods are assembled, stored and di...
Patch 1: Network topology analysis (ILO1, ILO2)Patch 1: Network topology analysis (ILO1, ILO2)Network topology often plays a vital role in the behaviour of the network itself in terms of performance, efficiency,robustness, etc. For this patch, you are to study two given networks (Network A and Network B). Download the following files from Brightspace Assessment. The files contain the adjacency matrices of the two networks for consideration In...