Class Activity Chapter 2 NURUL ANIS
Class Activity Chapter 2 NURUL ANIS
Class Activity Chapter 2 NURUL ANIS
Learning Outcomes
This Tutorial encompasses activities 1
Activity Outcome:
Answer Security Policy Questions
In In this activity, you as a network administrator at Infinity Design Solution Sdn. Bhd. must
answer questions concerning security policy to strengthen the security in the network
1. List the person(s) responsible for each piece of network equipment that is used in your
classroom (for example, routers, switches, and wireless access points).
Routers:
● Network Administrators: Network administrators are typically responsible for
configuring and managing routers. They handle tasks such as setting up
routing tables, managing IP addresses, and ensuring proper connectivity
between different network segments.
Switches:
● Network Administrators: Similar to routers, network administrators usually
handle the configuration and management of switches. They configure
VLANs, manage port settings, and ensure proper traffic flow within the local
network.
Wireless Access Points (WAPs):
● Network Administrators: Network administrators are responsible for
configuring and maintaining wireless access points. They set up wireless
security, manage SSIDs (Service Set Identifiers), and troubleshoot
connectivity issues in the wireless network.
Firewalls:
● Security Team or Network Administrators: Firewalls are critical for network
security. In larger organizations, a dedicated security team may manage the
firewall rules and configurations.
2. List the person(s) responsible for the computers that are used in your classroom.
IT Support Team
Classroom Technology Coordinators
Teachers and Faculty
System Administrators
Student Technology Assistants
Asset Managers
Network Administrators
Security Team
3. List the person(s) responsible for assigning permissions to use the network resources.
Network Administrators
System Administrators
Security Team
Data Owners
User Account Administrators
Group Administrators
Helpdesk or IT Support Staff
Auditors and Compliance Officers
End Users:
Resource Owners
Access Control Administrators