M06 Ch 14 Mini Sim on Information Technology

docx

School

Ivy Tech Community College, Indianapolis *

*We aren’t endorsed by this school

Course

101

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by CaptainFire13129

Report
M06: Ch 14 Mini Sim on Information Technology Decision Point: Prioritizing Tasks You have many decisions to make in the next few days. Your boss, Pearl, calls to check on how you’re doing: "I know you have a lot on your plate. Make sure you prioritize security and cost- savings tasks first, and let me know how I can help." You scan your To Do list. Which of the following should be your higher priorities? Check the three items that should be a high priority, and then click Submit. Investigate how the company’s Internet bandwidth is being used. Upgrade all computers to the new Windows operating system. Assess the company’s disaster recovery capabilities and identify key areas of improvement. Release a policy on the privacy of employee email. Select a new mobile device for the sales force.
Repair the extranet firewall. You chose to assess the company’s disaster recovery capabilities and identify key areas of improvement. That was one of the best choices. This is a critical issue. It is safer and smarter to have a proper disaster recovery plan in place in the event of natural or man-made disasters. Without an effective disaster recovery plan in place, the effects of such disasters could be catastrophic to the company. Thus, this task should be a high priority. You chose to release an email privacy policy. That was not the best choice. Email privacy is a complex issue. If it is not critical at this moment, it may be better to put it on hold and make it a lower priority. You chose to repair the extranet firewall. That was one of the best choices. The company’s firewall is what keeps its computers safe from hackers. Keeping it in working order is of utmost importance. Decision Point: Repairing Your Company's Extranet Firewall You decide to address the company’s extranet firewall issue first, so you call your co-worker Steve. "I completely agree that we need to address this firewall issue immediately. What do you want me to do?" asks Steve. What should you tell Steve? Select an option from the choices below and click Submit. Because the extranet is accessed only by employees and not the general public, email everyone in the company and tell them not to use it while you repair it.
The extranet affects both employees and outside vendors, so temporarily disable it while you address the firewall issues. Ask all employees to submit their devices for a hardware check by the IT team to identify the issue. You chose to temporarily disable the extranet. That was the best choice . Temporarily disabling the extranet until the firewall issue is addressed ensures that all data flowing into and out of the extranet remains protected. Decision Point: Evaluating Firewall Security The firewall has been repaired as per your directions. You want to be absolutely sure that the firewall issue has been fixed completely without introducing new security threats. What action plan will you opt to implement for evaluating the security of the firewall against external security threats? Select an option from the choices below and click Submit. Speak to the teams responsible for finding the firewall issue and fixing it. Understand the issue with the firewall and the solution used to repair it. Discuss the possibility of the firewall being breached and get an assurance that it is indeed secure.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Enable the extranet after the firewall has been repaired. Send an email to the employees and vendors to let them know that the extranet is working. Ask the employees and vendors to contact your IT department immediately if they suspect activities such as malware attacks, viruses, and phishing scams on their systems. Hire a white-hat hacker, and tell them to try to breach the firewall and compromise secure data. Ask the hacker to identify security weaknesses in the firewall. Ensure that this occurs at night when the network load is low and very few people are affected. You chose to hire a white-hat hacker. This was the best choice. Hiring a white-hat hacker indicates that you are being proactive in evaluating the security of the firewall. A white-hat hacker can identify and help repair firewall weaknesses before they are breached by external threats with malicious intentions. Decision Point: Addressing Bandwidth Usage Your next task is to look into the company’s bandwidth usage. You’ve requested a report from your coworker, Melissa. From: Melissa Mancuso, IT Subject: Internet Bandwidth Usage Report Attachment: Bandwith Report
Attached is the Internet bandwidth report you requested. Some interesting data here. What action would you like us to take? —Melissa Select an option from the choices below and click Submit. Create and enforce a policy governing the use of the company Internet and continue to monitor bandwidth usage. Accept that this is the cost of doing business, so pay to increase the bandwidth. Require supervisor authorization for any download. Continue to monitor the situation as long as there are no complaints from the Internet provider about the illegal download activities. You chose to create and enforce an Internet policy. That was the best choice. By creating a policy and communicating it to employees, you are taking steps toward improving your bandwidth speed without cost and are protecting the company from potential legal sanctions from the illegal downloading. Decision Point: Updating the Operating System Now that you've made a decision on the bandwidth issue, you’re ready to tackle your next task.
You boss calls and says, "Just checking to see what your decision is about upgrading to the new Microsoft operating system. Can you let me know by the end of the day?" The operating system (OS) decision involves many factors. Which of the following considerations are most important? Drag each item into the correct category. When all the options have been categorized, please click Submit. Important Considerations Important Considerations Droppable Important Considerations Droppable Cost for a site license Hardware requirements for the OS Cost for training/retraining in the new OS Compatibility with existing applications in use at your firm Stability of the new OS platform Less Important Considerations Less Important Considerations Droppable Less Important Considerations Droppable Popularity of the new OS compared to other OS Press releases for the new OS Magazine reviews of the new OS Whether your competition has migrated to the new OS Great job! You correctly categorized the considerations. Decision Point: How to Handle Privacy Issues You’re now ready for lunch but decide to check your email one last time. You see a high-priority message in your Inbox.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
From: A. McGreevy, IT/Security Subject: Confidential Priority: High We recently reviewed an employee email that indicated two employees are having an affair—and one of the employees reports directly to the other. This type of situation has left other companies exposed to sexual harassment charges and has interfered with productivity. How would you like to proceed? Forwarded: Employee Email Oh honey bun—I can’t wait to see you tonight. How about we skip that deadly dull production meeting. You can just get the program manager to go instead, can’t you? xoxo Boo-Boo What should you do? Select an option from the choices below and click Submit. Issue a memo reviewing the company policy on email privacy and discuss the situation with HR. Be proactive and recommend transferring the two employees into separate divisions of the company. Until the situation affects productivity, there is nothing you should do but wait and see what develops.
You chose to issue a memo on email privacy and discuss it with HR. That was your best choice. Issuing a memo reviewing the company policy on email privacy ensures employees are aware that any email sent over the corporate network is not private. Discussing the situation with HR is also wise. Decision Point: Mobile Device Deployment There is a knock on the door. It’s Gary from sales. He’s been bugging you to get him set up with a new mobile device for months. The sales force use their devices for checking email and working with files related to customer accounts. "So are we getting new mobile devices? The ones we’re using now are slow and lack all the newest features. What’s the verdict?" he asks. What should you tell Gary? Select an option from the choices below and click Submit. Offer new standard smartphones to sales employees. Cost: $500 to $700 Features: Android OS, 5.5" screen, 4 GB RAM, 64 GB storage Offer pro-level tablets/PCs with touchscreen and stylus. Cost: $1000 to $1800 Features: Intel Core i7 processor, Windows 10, 16 GB RAM, 256 GB SSD, stylus/pen, high-end touchscreen display
Deploy mid-level two-in-one tablets/PCs to sales employees to use in the office and on the road. Cost: $250 to $1000 Features: Intel Core i7 processor, Windows 10, 16 GB RAM, and 512 GB SSD You chose to deploy a mid-level two-in-one tablet. That was the best choice. A two-in-one tablet/PC offers a portable desktop alternative. This device will offer efficiency in checking e-mail and working with sales files. Decision Point: Acquiring Mobile Devices Although you can make a decision based on the price and specifications of each device, it is wiser to conduct more research to justify the purchases. You tell Gary that you need more time to decide. Gary replies that the ability to access and edit files on the go will be a huge time- saver, and any investment in two-in-one devices is bound to deliver a positive ROI in the long run. Gary asks you if there are any alternatives. You confer with the IT department and discuss the three suggestions provided by different members of the group. You have to pick the most viable alternative and implement it. Which of the following alternatives would you pick? Select an option from the choices below and click Submit. Raul’s suggestion is to fast-track the purchase process for mid-level two-in-one devices by using readily available market statistics on device usage by Magnificent Tees’s competitors. His suggestion is based on the idea that people working in the same field in the same industry would have similar job requirements.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Ray’s suggestion is to rent mid-level two-in-one devices from a vendor until the decision to buy mobile devices is made. These are available for rent on a daily basis at a fraction of their actual cost. Jane’s suggestion is to implement a BYOD (bring your own device) policy with strict security measures in place. With a BYOD policy, an employee would be responsible for procuring and keeping their own device safe. You chose to rent mid-level two-in-one devices. That was the best choice because it will allow you to rent the devices for a small cost while you can make a more informed decision. It will also give the sales staff a chance to try the devices before a costly purchase is made.