Study
Processes to Vet Ethical Hackers for Employment
When hiring ethical hackers, it is important to check a candidate’s background. This can be done by interviewing the candidate to see if they are who they say they are. After the interview, if the work involves government data, Disbarring and Vetting Service, Security Clearance and Baseline …
Read MoreRole of Ethical Hacking
Ethical hacking is an authorised attempt to breach a computer system, application, or data without malicious intent as this is agreed and scoped with the client. The purpose is to find and document vulnerabilities which are presented in a report to the client so that mitigation strategies and …
Read MoreWays to Manage Local Storage
Disk quotas
If using Windows, the administrator can configure the New Technology File System (NTFS) to allocate disk quotas to users individually or for a group so that by default, new users are given the preset disk space automatically. They can set up a notification as the users approach their …
Read MoreWays to Maintain and Monitor Network Performance
Software utilities
Ping
Pinging can show the round trip time in milliseconds for a message to be sent from the sender to the receiver and then back to the sender in the command prompt in Windows OS. If using Windows, It makes 4 attempts by default and displays any retries, the number of data losses …
Read MoreWays to Support and Maintain Network Security
Access control (rights and permissions)
Access control is a set of protocols that acts as gatekeepers to block unauthorised users and devices from accessing a private network, or give restricted access to external users. The policies prevent unwanted intruders from entering the network or data from …
Read MoreTest Equipment for Wired and Wireless Networks
How can test equipment be used for a wired network?
Cable tester
A cable tester is used to test the strength and connectivity of a specific cable to ensure the physical connections are installed correctly. This is done by connecting the tester to the end of the cable in question. The cable tester …
Read MorePurpose and Characteristics of Different Wireless Systems, Antennas, Devices
WAP
Purpose
A wireless access point (WAP) is a network device that acts as an intermediary between the wireless local area network (WLAN) and a wired network for data transmission. Wi-Fi enabled devices connect to WAP to access the internet. In a home or a small business, a router has an in-built …
Read MorePurpose and Characteristics of Different Types of Cable
Coaxial cable
Purpose
A coaxial cable is used to carry high-frequency electrical signals in telephone trunk lines,
broadband internet, busses, cable television. It is shielded against interference to achieve low
losses.
There are commonly two types: RG6 and RG59. RG stands for radio guide. RG6 …
Pentest Report
Task
I will be testing the website …
Read MoreRoutine Network Performance Management Activities
Routine network performance management activities are as follows:
Planning
In the planning stage, the future demand of network capacity is determined by historical data and growth trajectory based on business forecasts, technological trends, regulations, etc. Redundancy needs to be factored in …
Read MoreFunctions of Network Management
Network management is responsible for 5 functional areas as defined by the International
Organization for Standardization (ISO), which can be explained with the FCAPS model which is the
management of fault, configuration, accounting, performance, and security.
Fault management is the monitoring …
Impact of Emerging Network Technologies
Multi-cloud networking
A multi-cloud networking (MCN) is one that uses more than one cloud services or data centres which could be a combination of public and private to service an application or an enterprise. By using more than one cloud, the enterprise benefits from the specialism or strengths …
Read More