Ask a question from expert

Ask now

1. Create a table of the four architectural layers of t

1 Pages339 Words369 Views
   

Added on  2019-09-16

1. Create a table of the four architectural layers of t

   Added on 2019-09-16

BookmarkShareRelated Documents
1. Create a table of the four architectural layers of the TCP/IP suite. Include common protocols at each layer.Layer Protocols Responsibility2. In a brief essay explain the concept of encapsulation. What is it and why is it important for you to understand? Are there encapsulation vulnerabilities that can be exploited?3. Designing a Secure Network. Take two of the technologies from the list in the textbook and briefly describe what they are and why they are used in the topology of a secure network.4. In a brief essay explain the difference between the three types of firewalls. Provide a brief scenario of the use of each of the three.5. Do some research on the vulnerabilities of routers and switches. Describe at least two vulnerabilities for each. What can be done to reduce the threat to these two devices?6. Create a table of the four types of intrusion detection systems. Type Description How it is used7. Authentication is based on one or more of five factors. Create a table of these five. Factor Example8. In a short essay describe the pros and cons of implementing a single factor authentication system and of implementing a multifactor authentication system. Cite your resources.9. In a short essay explain Layered Security and Defense in Depth. Give an analogy for the philosophy behind this from another area (Eample: physical access to a military base).10. In a short essay describe Transitive Access. Explain why this is an important technique for large networks.11. There are four primary methods of access control (Example: Mandatory Access Control). Create a table of these four and describe them. Access Control Method Definition12. Create a table that summarizes the five tunneling protocols outlined in the text.Protocol Definition Use
1. Create a table of the four architectural layers of t_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
VPN Network Design for SME - Network and VPN Services
|15
|1015
|292

Wpan technology Assignment
|6
|928
|23

Introduction to Networks and Internetworks
|25
|7002
|65

Networking and Software Design Patterns
|10
|1561
|50

The OSI and TCP/IP Models (PDF)
|9
|1512
|110

VPN Network Design for SME
|13
|608
|442