Figure 4 presents a Marketing folder for Lego Company Sdn. Bhd that is published within the DFS namespace containing two target shares. One share is located on a main office file server in Kuala Lumpur (KL) and the other share is located on a branch office file server in Kuantan. The shared folders are kept synchronized by the DFS Replication. However, the DFS replication does not use Remote Differential Compression (RDC). Even though multiple servers host the source folders, this fact is transparent to all employees in the main and branch offices, who only access a single folder in the namespace. If one of the target folders becomes unavailable, the employees can be redirected to the remaining targets within the namespace. The company applies 7 layers of Defense-in-Depth to increase security of the network. User in KL Server in KL 1|Contoso.com\Marketing DFS 1INYC-SRV-01 \ProjectDocs Replication Folder Targets 1ILON-SRV-01 \ProjectDocs DFS Namespace User in Kuantan Server in Kuantan User types: \\contoso.com\marketing 1 Client computers contact a namespace server and receive a referral Client computers cache the referral and then contact the first server 2 in the referral Figure 4 (c) Propose a mechanism that can be used to ensure the communication between the main and branch office has a secure connection and is also secure against external attacks. Elaborate your proposal in detail. (d) Besides Defense-in-Depth that is applied in the company to provide security to the system, propose another ONE (1) method that can be used to secure the server in that company. Justify your selection.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Figure 4 presents a Marketing folder for Lego Company Sdn. Bhd that is published within the
DFS namespace containing two target shares. One share is located on a main office file server
in Kuala Lumpur (KL) and the other share is located on a branch office file server in Kuantan.
The shared folders are kept synchronized by the DFS Replication. However, the DFS
replication does not use Remote Differential Compression (RDC). Even though multiple
servers host the source folders, this fact is transparent to all employees in the main and branch
offices, who only access a single folder in the namespace. If one of the target folders becomes
unavailable, the employees can be redirected to the remaining targets within the namespace.
The company applies 7 layers of Defense-in-Depth to increase security of the network.
User in KL
Server in KL
1|Contoso.com \Marketing
DFS
INYC-SRV-01 \ProjectDocs Replication
Folder
Targets
1ILON-SRV-01\ProjectDocs
DFS Namespace
User in Kuantan
Server in Kuantan
User types: \\contoso.com\marketing
Client computers contact a namespace server and receive a referral
Client computers cache the referral and then contact the first server
2 in the referral
Figure 4
(c)
Propose a mechanism that can be used to ensure the communication between the main
and branch office has a secure connection and
also secure against external attacks.
Elaborate your proposal in detail.
(d)
Besides Defense-in-Depth that is applied in the company to provide security to the
system, propose another ONE (1) method that can be used to secure the server in that
company. Justify your selection.
Transcribed Image Text:Figure 4 presents a Marketing folder for Lego Company Sdn. Bhd that is published within the DFS namespace containing two target shares. One share is located on a main office file server in Kuala Lumpur (KL) and the other share is located on a branch office file server in Kuantan. The shared folders are kept synchronized by the DFS Replication. However, the DFS replication does not use Remote Differential Compression (RDC). Even though multiple servers host the source folders, this fact is transparent to all employees in the main and branch offices, who only access a single folder in the namespace. If one of the target folders becomes unavailable, the employees can be redirected to the remaining targets within the namespace. The company applies 7 layers of Defense-in-Depth to increase security of the network. User in KL Server in KL 1|Contoso.com \Marketing DFS INYC-SRV-01 \ProjectDocs Replication Folder Targets 1ILON-SRV-01\ProjectDocs DFS Namespace User in Kuantan Server in Kuantan User types: \\contoso.com\marketing Client computers contact a namespace server and receive a referral Client computers cache the referral and then contact the first server 2 in the referral Figure 4 (c) Propose a mechanism that can be used to ensure the communication between the main and branch office has a secure connection and also secure against external attacks. Elaborate your proposal in detail. (d) Besides Defense-in-Depth that is applied in the company to provide security to the system, propose another ONE (1) method that can be used to secure the server in that company. Justify your selection.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Linux
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education