WGU D482 performance assessment 2024; DHN1 Task 1: Network Merger and lOMoARcPSD|5967629
lOMoARcPSD|5967629
WGU D482 performance assessment 2024; DHN1 Task 1: Network Merger and Implementation with complete solution
D482- Secure Network Design
DHN1 Task 1: Network Merger and Implementation
Company A security and infrastructure problems:
•Network security problems in company A:
oCompany A has multiple unnecessary open ports shown in the security risk analysis. These open ports include ports 21-90 and port 3389. Several of these ports should be secured or disabled. For example, port
23 is a TCP called Telnet. Telnet is an unsecure protocol that gives access to remote systems and has several known vulnerabilities. Port 3389 is the Remote Desktop Protocol (RDP) which is used to connect to
computers remotely with a graphical interface. This port should be
昀椀ltered so that access is limited to only certain users within the company, as several known vulnerabilities exist.
oCompany A has an issue with having very weak password requirements. The security assessment shows that all current users use eight-character passwords. If an attacker gains knowledge of this
information, it greatly increases the risk of a password attack and allows the attacker to gain access to that system. Passwords should also be mandated to periodically be changed for users.
•Network infrastructure problems in Company A:
oCompany A shows that it is currently using the Meraki wireless access point for its Windows laptops connectivity. This product has several known vulnerabilities and is also at its End-of-Life, meaning patches for
lOMoARcPSD|5967629
WGU D482 performance assessment 2024; DHN1 Task 1: Network Merger and Implementation with complete solution
D482- Secure Network Design
DHN1 Task 1: Network Merger and Implementation
Company A security and infrastructure problems:
•Network security problems in company A:
oCompany A has multiple unnecessary open ports shown in the security risk analysis. These open ports include ports 21-90 and port 3389. Several of these ports should be secured or disabled. For example, port
23 is a TCP called Telnet. Telnet is an unsecure protocol that gives access to remote systems and has several known vulnerabilities. Port 3389 is the Remote Desktop Protocol (RDP) which is used to connect to
computers remotely with a graphical interface. This port should be
昀椀ltered so that access is limited to only certain users within the company, as several known vulnerabilities exist.
oCompany A has an issue with having very weak password requirements. The security assessment shows that all current users use eight-character passwords. If an attacker gains knowledge of this
information, it greatly increases the risk of a password attack and allows the attacker to gain access to that system. Passwords should also be mandated to periodically be changed for users.
•Network infrastructure problems in Company A:
oCompany A shows that it is currently using the Meraki wireless access point for its Windows laptops connectivity. This product has several known vulnerabilities and is also at its End-of-Life, meaning patches for