Erin Kesterson
Forum Replies Created
-
AuthorPosts
-
Erin Kesterson
ParticipantI know that I have lost God and I have found my way back to him. Was I created for Gods purpose I would want to believe He has a plan for all of us. I believe he created us for our own purpose of learning and following his path he set before us to praise his glory and his word. I believe he has put struggles ahead of me to lose my faith and then find my way home. I have struggled with addiction and had to fall and let my God take the wheel of my life to learn I am at his mercy and will and I love my God and without him in it and his word and glory I would still be lost. God gave me strength when I fell it was him that picked me up. I spread the word of addiction and I am a peer to peer support counselor thru a local service that I listen and take and support other recovering addicts to know my story and thru my recovery let them know at least they have one person who believes in their recovery and I believe that is Gods purpose for me and the path he set before me today.
Erin Kesterson
ParticipantThree Network Polices would be:
1. Standardizing hardware and software Ip addresses to be able to manage or do troubleshooting better and make it easy and simple to do/
2. Security Policy to keep your data and information at a level of protection against hackers and others being able to use it for fradulent reasons and virus that can infect your device or systems/
3. Reliability and Availiblity of the network and how well it can send and recieve data and information that is being tranmitted through the cables and waves to other companys and devices.
Erin Kesterson
ParticipantThe two impressions I have took from chapter 9 is that it is a timely thing with learning all the differences in what a network is and what it all contains. Like the differant proxy’s and Protocols. Systems logs and ect that makes up the day to day networks.
The next impression I gotten from this chapter was that it builds a relationship over time with the server and clients to build this trust will help with the day to day networking and be able to build future clients.Erin Kesterson
ParticipantYou have made very good points and explained them very well and easy to understand. I really enjoyed reading your post.
Erin Kesterson
ParticipantTrae you have very good points on the differences of the two. I really like the way you have explained how each is different. The cloud cant exist without the virtual where the virtual can exist without the cloud. It surprises me that the two are different all of the points you have made plus some. You would think with the technology today they could figure a way that the two could run without one another Just my own thoughts on that. There are many different clouds today that all of them could possibly work alone at some point in the future dont you think?
Erin Kesterson
ParticipantThree differences between a virtual and a coloud environment is:
1. Virtual is a software that separates physicl infrastructures to creae various resources.
Virtual is the foundation for the cloud.2. Cloud delievers a shared computing resources software or data . Virtual is simple with
the process of software used and hardware it exist without the cloud but the cloud can not exist without the vistual.3. Vistual manipulates hardwardware where cloud is the outcome of the manipulations.
Cloud is a service or a ondamand through the internet.Erin Kesterson
ParticipantTwo controls or methods that help harden a server or network.
One would be the firewall it makes a foundation to secure a policy that will denie all traffic unless explicitly permitted. It looks and updates the rules and changes in a network and requirements, closing any unused or unnecessary network ports to reduce the attacks.
The second one would be Zero Trust Network Access (ZTNA) This is just as it is said it allows no access in a connections security and it will need to be reautherized for every action taken. This help keep the data and network secure and hard to override, Even with familiar and trusted networks trying to access it it gets blocked till its autherized. Organizations can define the securitypolicies for each deviced connected to the network.
Erin Kesterson
ParticipantI believe I am a good person I have made a lot of wrong doings threrefor I dont believe I am good enough for god to allow me into his kingdom. My wrongs cant be made right I can learn from them and move on but The truth be told I am not good enough to even questions my past or ask to be let into a kingdomthat I was fit for before I could walk. Then to take a path that wasnt meant for me and listen to the devil instead of my creator. I have asked for forgiveness and I am good enough for Gods forgiveness that is all I need to keep faith and follow my lord and savor.
Erin Kesterson
ParticipantCybersecurity is among one of the major threats in todays businesses to keep thriving in small and medium sized offices. The cyber threats jeopardizes the impact of not only the business but the customers being able to connect to the services. The goal of this is to tackel the breach with real time solutions and to mitigate the risk. Third parties can unlawfully misuse tge oitebtuak if 5G and it is a challenge the risk is emotional or fhysical attacks on the techonogy and allow them to exploit the data colled or stored thy are capitalixwd on the complex of 5 g networks to carry out the malicious activities. The goal would be to increase the rate of malware attackes on existing moble phones and various packages as tousanticovid,apk are hidden in banking apps abd are downloaded from malicious websites or hyperlinks.
Erin Kesterson
ParticipantStandard LAN would be IEEE 802.11 ac and 802.11ax. 802.11 ac is mostly used in homes and office networking to allow laptops and printers and other devices to communicate accross the devices. to access the internet without connecting wires the IEEE 802.11 is basis for vehicles-base communication to. This is also for 5GHz.
802.11n is a wireless networking that uses multiple antenna to increase the rates of data. Startard support for multipal input and output frame aggregation and improved security with other features and also can be used on 2.4 GHz and 5 GHz.Erin Kesterson
ParticipantA few years back I was under the control of addiction and I was letting it destoy every part of me and my life. It took alot to overcome where and who I can trust in my life. I lost faith I lost family and friends and believed the only thing that loved and wanted me in life was drugs. It took alot for me to get clean and sober and been sober and clean for 4 years and 3 months. I have a home bought with my own money 2 cars and a truck paid for. I gotten custody of my daughter back and she is home living with me. I am college presueing my dream job. I have met a man whom I believe is my person in life. I have my faith in God back and hand all my problems and struggles over to him. For I know he is here for me and I dont live a life without him to help carry me when I am weak.
I have struggled and lost from freedom to death all for something God spoke to me and told me to listen and at that time I didnt listen to the words I though I was imagining voice and when I found out I had cancer The voice came again and told me to listen. I was told I am not alone and always remeber I am loved and he will be here to carry my worrys just keep faith and believe in him. I am and will continue to do that. God is a mighty god and he will always be beside us even when we dont hear or know hes there he truly is always with each and everyone of his children.Erin Kesterson
ParticipantThree Main Protocol would be TCP (Transfer Control Protocol). It allows data to be broken down and sent in the order it is ment to be in.
2. The next would be IP (Internet Protocol) This allows the data to be sent to another device within the same network.
3. Is the DNS (Donain Network Protocol) The DNS also uses a IP address to send data with this it makes sure it is going to the right address and device and will have some websites and businees hold the site for the data to arrive correct and in the right place.
Erin Kesterson
ParticipantThe difference between a router and a switch is how the data and information is sent. A switch will look for the most effcient way to send the data and a router will send the data throught the network that is local area data within the same MAC address. The Switch sends data through a IP address that allows you to be able to send data to anyone or device.
Erin Kesterson
ParticipantWith all the media and social media that is in the world today. It makes it easy to stray away from our lord and savior. I have seen may people doubt what is in our paths that God has set for us by following others and not following our belief and heart and knowledge. To keep believing the word of God we need to remind ourself who our creature is and what paths he has for us. To pray and spread his word and wisdom. To limit our time on voices from the media and know that he shall be the one to judge us in the end of every decision we have made through out our life time.
Erin Kesterson
ParticipantThree different types of Network Devices would be
1. A Hub. A hubs is essential multiport device that coneects multiple Ethernet devices into a single broadcast network. which makes them prone to traffic congestions. There are three types of Hub. Passive, Active, intelligent.
2.The Bridge is different then the Hub because the Hub connects multiple devices where the Brigde connects two or more network and filters the traffic between them the role is to isolate local segment traffic adn reduce traffic congestion for better network performanve.
3. The Router its main job is to direct traffic to thier destinations and chart the path through interconnected network devices that store information about their coneectd networks
-
AuthorPosts