Week 8 Assignment Complete

docx

School

Capella University *

*We aren’t endorsed by this school

Course

5010

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by BrigadierSteel11579

Report
ITEC5010 - Security and Enterprise Networks Unit X Assignment Name: Tadrieka Collins Lab Screenshots and Narrative Exercise 1, Task 1, Step 7 This week I learned to back up and restore config files using TFTP. Assignment 1. Explain three best practices for data backup and restore to prevent data loss. Regular/Automated Backup – Depending on the criticality and frequency of data changes, one may schedule daily or hourly backups. Automizing this process can eliminate human error. Multiple Backup Locations – Storing backup copies in several different locations including the cloud or offsite at a physical location can protect against disasters such as a fire or flood. Encryption – Strong encryption protocols for data in transit and at rest can protect sensitive information during the backup process. 2. Describe three tools that are available to network and server administrators to ensure that system patches and data backups are occurring effectively. Microsoft Windows Server Update Services (WSUS) – This tool was designed for windows environments to manage the distribution of updates released through Microsoft Update to 1
computers within a corporate environment. Some key features include automation, patch management, and reporting/monitoring. Veeam Backup & Replication – Data protection and backup solution for virtual environments such as VMware vSphere, etc. Essential features include backup and replication, and like WSUS, Monitoring and reporting. Nagios – Open-source monitoring system that can monitor various aspects of a network and server infrastructure. This tool features customizable monitoring, alerts, and performance graphs. 3. Describe important things to consider when deploying system patches. Test Environment – Before deploying patches in a production environment, testing them in a controlled environment will help identify compatibility issues or any unforeseen consequences. Backup – Before deploying patches, it is important to perform a full backup of critical systems and data. Continuous Monitoring – Continuous monitoring and evaluation of the process can provide useful feedback for future patching procedures. 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help