design a network policy design and perform some risk analysis steps etc. as instructed in the attached document.
For the steps 1, 2 and 3, you won’t have access to create a new user or to grant/revoke access for a user. So you just need to give the correct query for the first 3 steps.
For step 4, you have to use the MS Excel for XOR encryption (Similarly like Lab 4).
For step 5, you have to prepare the Network Policy document for KLJ corporation.
For step 6, you have to draw a physical security for KLJ corporation. You can use MS Visio or some on-line tools.
For Step 7, you can use MS Excel for risk assessment.
Other steps are self-explanatory.