Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Week 9 discussion 3 different parts
CIS 435
· Imagine that a systems administrator for a midsized company has recently noticed numerous odd characters in the log servers. Specifically, http “GET” and “POST” log entries within their externally facing IIS version 5 web server. Discuss the use of the “GET” and “POST” commands and decide whether or not there are concerns with their presence on the externally facing web server. Next, provide your analysis of the most damaging attack (i.e. XSS, SQL Injection, CSS, and Race conditions) against Internet Information Services (IIS). Support your rationale.
CIS 255
When to Script?" Please respond to the following:
· Scripts can be great tools. Describe one task where it would be suitable / efficient to use a script and another task where it might not be. Provide a rationale for your response.
· Give one (1) example of a situation where the use of a regular expression is not appropriate and explain why it is not appropriate.
CIS 498
"Project Management Best Practices and Recognizing Project Migraines" Please respond to the following:
· As a newly minted CIO, you have been hired to join a company without a history of project best practices. Suggest strategy and process for your Chief Executive Officer (CEO) to develop standards for your organization that is without any such organizational project history. Justify the main reasons why your suggestion would be effective.
· Reflect upon Kerzner’s “Sources of Smaller Migraines” from Chapter 2. Select three (3) issues from the list. Then, specify the reasons why these issues are more critical to control than the others. Justify your response.