Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Amy Hastings

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 65 total)
  • Author
    Posts
  • in reply to: OCU C)NP A Week 05 Devotion #91118
    Amy Hastings
    Participant

    I do know God as he is my lord, I understand that what I have been given I gained from God’s path for me. I believe we are all put here for God’s purpose as he gives each of us our own, never the same for any two people. I will continue to be in God’s faith and follow the path given to me by him himself. We all hear God speaking to us even though it may not be in words physically but by reading in the bible and or going to church and praising God and his word every Sunday morning. I am also glad that we get a day to worship him, I believe God is always with me in or out of church for he has lead me down my path so far and will continue to do so until I meet him some day in my future of good living. But his voice would be even stronger towards me once that day comes and it is honestly a beautiful thing to think of it this way.

    in reply to: OCU C)NP A Week 05 Lesson 10 Discussion #91116
    Amy Hastings
    Participant

    Amazing points and policies included in your discussion. The password changing is a huge one today as a ton of people get hacked everyday due to this simple mistake. Remote access is also a good one as it includes people at home or on the go, and you make a great point in explaining everything in this discussion amazingly!

    in reply to: OCU C)NP A Week 05 Lesson 10 Discussion #91115
    Amy Hastings
    Participant

    Security features on the device is one networking policy as many people have weak passwords and this makes is so much easier for a hacker to login to your device and hack all your information and to gain access. This is why it is recommended for users to update their passwords often.

    Another would be the availability to the network from the device. You must have availability to a good strong network to do anything online. It is also important to have excellent connection access that is commonly reached through the network redundancy features.

    Lastly, I would say that performance is a good policy in network planning. Good performance helps with almost everything on a device, because it runs everything at a great speed and you would have a smooth running device. Performance also helps apps and the web search go a lot faster than having a slow or weak performance.

    in reply to: OCU C)NP A Week 05 Lesson 09 Discussion #91113
    Amy Hastings
    Participant

    Great detail in this, I agree it is important to share your knowledge and information as this is very important to do in this field of work. I also think you did amazing at explaining what chapter nine is about and the way you took the information given in it.

    in reply to: OCU C)NP A Week 05 Lesson 09 Discussion #91112
    Amy Hastings
    Participant

    When reading chapter nine, Day to Day Networking, I had a great impression of being able to further my network some day and where it may lead me some day as well. I think that chapter nine also helped me realize and see new benefits and opportunities to have my own brand or product eventually in life. It really opens my eyes and my mindset to see the different paths I could take the further expand, it also is amazing on how many options and opportunities that I could have in this field of work. It also shows just how important it is to keep all your work and knowledge together in case it may be needed in the future of my IT work some day. As this can be very helpful to get a job in this field.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90659
    Amy Hastings
    Participant

    very well explained, both that you listed are explained very good and made easy to know the differences between the two. The DMZ explanation is exceptionally good, it is helpful to lessen chances of attackers or hackers from public servers.

    in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90658
    Amy Hastings
    Participant

    You put great examples and great explanations in this discussion. There are a lot of differences between cloud and virtual environments, this is well put.

    in reply to: OCU C)NP A Week 04 Devotion #90380
    Amy Hastings
    Participant

    I believe I am a good person, I have always been taught and told to be a kind person. But everyone has those days where they do not feel like talking or interacting with anyone which may come off as rude towards others. I do not believe any one is perfect and nice all the time, no one is perfect and everyone has their own flaws that make them not a perfect person. I also think that no one can be “good enough” and me included as I have done things that make me feel like I am not good enough for God’s kingdom. I can agree that being “good enough” is not enough for God and if you can accept you are not good enough for God then I believe he thinks you are, since you are not trying to be better than anyone else or “good enough” for anyone but yourself. I will always confess to God and have a good heart towards him, in hopes to get to be in his Kingdom one day.

    in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90379
    Amy Hastings
    Participant

    A virtual environment is where the virtualizations give off simulated things in a computers software, meaning it is a fa2e version of the real thing. It makes it look like and act like one thing but in reality is not real.

    Cloud environment is where you can share or combine different resources all through only one network. Cloud computing is also the place that apps and such run and work through, they are a place where data is accessible and with cloud computing there are three types including, private which is meaning only one single place can have access to it. Then you got public cloud computing which means it can be used in different places or a locally wide server. The last one is a hybrid cloud and this is used to keep confidential information and data secure.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90374
    Amy Hastings
    Participant

    Two methods you can use to harden your servers and network is a firewall, which is to help keep any network ports at a restriction towards the unnecessary things or the “traffic” coming in through them. You should also make sure you keep up on the updates towards your firewall in order for a better protection.

    Another would be server hardening which is a process that senses your data and information like your ports and any permissions you allow along that server. This is a more common hardening process today and it uses a lot of security top keep your data highly protected.

    in reply to: OCU C)NP A Week 03 Devotion #90143
    Amy Hastings
    Participant

    I personally do not have any bad addictions, I try to stay positive and remove any bad or negativity from my day. With God’s guidance I find it very helpful to do this. I have never done anything that I would consider an addiction, I grew up not to do anything like this since some of my family does have some sort of addiction, I have never wanted to go down their path. So yes, I take everything negative and think of all the good that could come out of it. God’s love has taught me to always do the right thing and for me this is to not take on any types of addiction, I know the consequences of it and God has showed me examples of what it can do to someone, so for this I follow God’s words and keep living knowing I have God’s love and guidance everyday.

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #90142
    Amy Hastings
    Participant

    You did an excellent job on listing major goals and threats in the tech industry. I also agree that they would want to reduce risks of cyber security being compromised. With the threats you listed, the cyber attack is very good to list here as it does give hackers personal and important info. Great job!

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #90141
    Amy Hastings
    Participant

    Some major goals would be to have a higher or more improved customer service experience with the products. It would have more sales and be good for the businesses. Another would be to save money and to make sure that the systems are secure. Keeping the systems secure will always be a number one goal for any type of business as it allows information to be kept safe and from being stolen or hacked.

    Some major threats would be viruses as having a virus on your device can lead to serious problems for your device such as, your information being stolen or you getting hacked and your device failing. You must be cautious and secure to prevent your device from any hacker or viruses. Ransomware is another major threat, it is one of the worst because it can cost the organization to use a lot of money because hackers can get into the device to do a ransom attack. This is a common threat to the tech network industries as it has been happening for years, causing businesses to fail and to lose millions of dollars.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #90139
    Amy Hastings
    Participant

    Your discussion is very well worded and explained. I like that you also included the date of when the 802.11 was published, not many people probably knew this! It is also well explained on where the first LAN standard came from and is a good point to add in this.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #90138
    Amy Hastings
    Participant

    Two wireless LAN standards are 802.11a, this one transfers data a lot faster but it can only do so from a range of 50-100 feet. It also allows multiple different connections and is less likely to come across an interference. Another example would be the IEEE 802.11g, this one is one of the most popular one used and it is used to send information and receive it. This one is also a “channel bonding” type of LAN, which means it can use two channels at a time. Wi-Fi is a good example as well of a WLAN or (Wireless Local Area Networks) as it has some of the same qualities as the others and it is also a wireless connection for other devices to send and receive information.

Viewing 15 posts - 1 through 15 (of 65 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .