Figure 4 presents a Marketing folder for Lego Company Sdn. Bhd that is published within the DFS namespace containing two target shares. One share is located on a main office file server in Kuala Lumpur (KL) and the other share is located on a branch office file server in Kuantan. The shared folders are kept synchronized by the DFS Replication. However, the DFS replication does not use Remote Differential Compression (RDC). Even though multiple servers host the source folders, this fact is transparent to all employees in the main and branch offices, who only access a single folder in the namespace. If one of the target folders becomes unavailable, the employees can be redirected to the remaining targets within the namespace. The company applies 7 layers of Defense-in-Depth to increase security of the network. User in KL Server in KL 1|Contoso.com\Marketing DFS 1INYC-SRV-01 \ProjectDocs Replication Folder Targets 1ILON-SRV-01 \ProjectDocs DFS Namespace User in Kuantan Server in Kuantan User types: \\contoso.com\marketing 1 Client computers contact a namespace server and receive a referral Client computers cache the referral and then contact the first server 2 in the referral Figure 4 (c) Propose a mechanism that can be used to ensure the communication between the main and branch office has a secure connection and is also secure against external attacks. Elaborate your proposal in detail. (d) Besides Defense-in-Depth that is applied in the company to provide security to the system, propose another ONE (1) method that can be used to secure the server in that company. Justify your selection.
Figure 4 presents a Marketing folder for Lego Company Sdn. Bhd that is published within the DFS namespace containing two target shares. One share is located on a main office file server in Kuala Lumpur (KL) and the other share is located on a branch office file server in Kuantan. The shared folders are kept synchronized by the DFS Replication. However, the DFS replication does not use Remote Differential Compression (RDC). Even though multiple servers host the source folders, this fact is transparent to all employees in the main and branch offices, who only access a single folder in the namespace. If one of the target folders becomes unavailable, the employees can be redirected to the remaining targets within the namespace. The company applies 7 layers of Defense-in-Depth to increase security of the network. User in KL Server in KL 1|Contoso.com\Marketing DFS 1INYC-SRV-01 \ProjectDocs Replication Folder Targets 1ILON-SRV-01 \ProjectDocs DFS Namespace User in Kuantan Server in Kuantan User types: \\contoso.com\marketing 1 Client computers contact a namespace server and receive a referral Client computers cache the referral and then contact the first server 2 in the referral Figure 4 (c) Propose a mechanism that can be used to ensure the communication between the main and branch office has a secure connection and is also secure against external attacks. Elaborate your proposal in detail. (d) Besides Defense-in-Depth that is applied in the company to provide security to the system, propose another ONE (1) method that can be used to secure the server in that company. Justify your selection.
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education