Close

Reply To: OCU ISSO Week 3 Lesson 09 Discussion

#85389
Marcena Davis
Participant

I certainly agree that star topology is the most common form of network topology, and it’s common and convenient because all the terminals are connected to a central device, making it easy to add or make changes to existing terminals. However, one major downside of using star topology is that if the main hub goes down, the entire network is affected. As you suggested, a security officer can mitigate the risk of downtime, data loss, and breach by ensuring that the proper backup systems and protocols are in place and tested regularly. Additionally, it’s crucial to ensure that only authorized individuals with the correct credentials are working on restoring the system and making the repairs.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!