I just need the flow chart, not the 350 summaries that it also asks for.
Need answers to the attached questions.
Check the attachment for the questions.
I don’t need any citations or references – just the content.
But ensure no plagiarism at all.
Each answer should be minimum 750 words
Project 2: Troubleshooting and Tool Report
The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.
Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.
- On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
- When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
- Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
- We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
- This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
- When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
- When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?
Your report should be about a page in length and address the following:
- Choose and restate one of the problems identified as you understand it and explain why it is a problem.
- Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
- Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
- Describe how the tool can be used to solve similar problems in the future.
- Provide a detailed overview of the tool’s functionality and options.
- Include a screenshot of your selected tool from the appropriate uCertify lab.
How Will My Work Be Evaluated?
Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.
For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
- 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
- 1.3.5: Adhere to required attribution and citation standards.
- 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
- 2.1.1: Identify the issue or problem under consideration.
- 2.3.1: State conclusions or solutions clearly and precisely.
- 10.1.1: Identify the problem to be solved.
- 13.1.1: Create documentation appropriate to the stakeholder.
When you are finished, delete the instructional text from the template before you submit. Click “add a file” to upload your work, then click the Submit button.
neering
I need this done by 4/15 at 5:30 pm. All the info is attached. Thanks!
Final Paper
- This paper will be a researched paper (15-20 double-spaced text pages) on adult learning theories and leadership principals on a leadership initiative within the student’s home institution or in an educational setting approved by the instructor. The paper should follow APA format.
- Title Page (Sample Title Page located at content tab)
- Chapter I. Introduction
- This is where you present a purpose, roadmap and short summary on the importance of your select topic and a short summary of the results of your topic
- Chapter II. Literature Review
- This where you will summarize the information and data from your references
- Chapter III. Analysis
- This is where you provide your own analysis of your topic anchored in fact and reason
- Chapter IV. Summary
- Summarize the meaning of your analysis
- Reference Page
- Please upload your completed paper by due date on the calendar.
The Internet of Things assignment
Complete the following assignment in one MS word document:
Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Discussion Questions:
1. Compare the IoT with the regular Internet.
2. Discuss the potential impact of autonomous vehicles on our lives.
3. Why must a truly smart home have a bot?
4. Why is the IoT considered a disruptive technology?
Exercise:
3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary
4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.
6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.
State Law
U.S. state you are currently residing in is Pennsylvania, research its breach notification law. Note that some states do not label it as such, but all 50 states have some form of legislation that mandates an organization’s responsibilities when a data breach affects the state’s citizen’s private, protected information.
Some research resources to consider include your textbook, of course; the UC Library, particularly via the Nexis Uni database; the state’s governmental websites; the state bar association’s (legal profession) website; Cornell University’s legal website; etc. Describe your state’s law including at least these considerations:
What types of organizations or individuals does it apply to?
Is it limited to only those organizations or individuals who reside or exist in that state, or might it affect external interests?
How does the law define or describe the information that it protects, by both name and description?
What exemptions, if any, exist?
What are the penalties for violating the law?
In your opinion, is it effective? Good law? Needing updating? What other critiques or opinions do you have about it?
500 words APA format needed with references
Need some help with an assignment
Details to the assignment uploaded.
Thank you!
Design, implement, test, and
Part 1
Design, implement, test, and debug a program with a JFrame that allows the user to enter a series of contacts’ names, ages, e-mail addresses, and cell phone numbers, and creates a file from the entered data. Validate the age entry to ensure that it is numeric and between 0 and 120. Include information for three to five contacts.
Part 2
Design, implement, test, and debug a program that reads the file you created by the list in Part 1 and displays the records in a JFrame. You may either display all entries in the list at once or display them one at a time; the user interface is up to you. Protect against not being able to open the file.
Assistance with Microsoft Access Project
You need to have access for this project and you need to send the finished file as an access file.
Instructions below
1) Address the points for improvements on the first assignment based on my feedback (first assignment uploaded below).
– Feedback:
Equipment table:
the field names were added on the first record.
* MembershipCard table:
* your table relationships don’t express a real scenario:
It’s not enough to simply start putting lines on the screen, we must think about how they connect.
For instance, you have a table called Activity (supposed to save information about physical activities people can do in a gym) – the relationship between members and activities doesn’t exist on your database (members can take part on many physical activities and many physical activities may include many members).
2) Our gym is a success, people are interested and our business is growing. As a result, you must add more records to your database – more members, more equipment, more activities, more physique records, more memberships, more trainers, etc. Make it so more members can take part on physical activities.
3) Create the following queries:
A) Create an APPEND query so John can easily enter new members into the database. John knows nothing about MS Access, but he does have experience with Excel.”
You can ignore the membership_ID for now this can be added later.
B) Create an UPDATE query. John will also be responsible to update the membership levels (in case the gym fees change)
* for update queries, the data is very important – because people will update the information. In this case, we still need to know the primary key, but we can hide it from the person editing the information to ensure they won’t change it.
C) Create a DELETE query – MS Access should ask which ID to remove from the database.
* you can pick which table you want to use as the delete (if you get errors about being unable to delete, that’s ok – it’s because of the relationships).
D) Create a SELECT query to display how much each customer pay for their membership fees after tax (you can consider as a one time payment, not really necessary to display monthly or yearly)
E) Using Query Parameters, create a SELECT query to display a member’s membership status. The person running the query can enter the member’s first name and see all the related info.
F) Using Query Parameters, create a SELECT query to display members taking part on physical activities. This query should allow people to enter the day in which they want to see registration info.