Reference no: EM133011663
Assessment Task 1: Short Answer Questions
Implement network security infrastructure for an organisation
Question 1: Explain the main differences between the following network devices; a Switch, a Router and a Hub. For each provide:
1. A brief description of their OSI layer(s) the device operates in.
2. The device main function(s)
3. and methods to secure access to the device?
Question 2: What's next-generation firewall (NGFW)? List one example of the technology it uses that was not available in classic firewall technologies.
Question 3: Use the Cisco command line Interface to configure two routers to communicate over a serial link.
Note. Please provide screenshots of configuration below with your name and student id visible in a notepad document.
( Use Packet Tracer Or hardware appliances)
Question 4: What is the differences between remote-access and site-to-site VPN? describe the two main IPsec protocols? What OSI layer(s) IPsec framework can protect?
Question 5: You were assigned the IPv6 address range 2001:db8:acad:a::/64. Answer the following questions:
A device (host) with an IP address 2001:db8:acad:a::aefd/64 wants to send a Ping packet to another host with a destination IP address 2001:db8:acad:b::aefd/64.
Explain the communication process describing the interaction process between Network (Internet) layer and Data-link layer and the two network addressing types.
Question 6: What is RADIUS, TACACS+? What is their benefits to secure networking traffic? What are differences between Local AAA Authentication vs Server-Based AAA Authentication methods?
Question 7: What is ACL? List types of ACL that can be used in Cisco routers? Give an example of each type with configuration commands.
Note. Please provide screenshots of configuration below including your name and student id visible in a notepad document.
( Use Packet Tracer Or hardware appliances)
Question 8: List three modern cyber security threats and provide Tools and procedures to mitigate the effects of those threats.
Question 9: Based on the article below article identify and describe 2 network security design architectures (chapter 6.4)
Question 10: Briefly explain the following:
• Security authentication standards for WLANs.
• IEEE 802.11 standards.
• ISM bands
• WPA3
• WPS
Question 11: Talk About strengths and weaknesses of RC4 comparing to AES as a WLAN encryption systems.
Question 12: In Cryptology, explain the differences between Cryptography and Cryptanalysis providing one protocol for each and list the three primary objectives of securing communications.
Question 13: List and briefly describe:
• Four asymmetric public-key algorithms used today
• Four protocols that use asymmetric key algorithms.
Question 14: For network-based Intrusion Prevention System (NIPS):
• Describe IPS & IDS functions?
• Describe how you can update the Signature Database file?
• Compare between IPS & IDS from weakness and strength view?
Question 15: What's the Plaintext resulted from deciphering using Vigenere Cipher that produced the following Ciphertext?
"k tgxs vq ftmfg fghyqek kgkmtwva nt zqtegginrn apalkhwvr"
Note. Use the below information:
Cipher code: CISCOCCNAS
Alphabet: abcdefghijklmnopqrstuvwxyz
Use repeat mode.
No case sensitive.
Note. This process should be done manually by each student
Question 16: Why is it important to keep your anti-virus (AV) updates for defending against new cyberattacks?
Question 17: Identify at least two (2) security vulnerabilities of a proxy server and what methods used to mitigate them?
Question 18: When considering WLAN, describe the relationship between the OSI Physical & Data link layers
Question 19: Develop WLAN security checklist that can be deployed for a small business.
Question 20: In order to manage Cisco networking devices, you need to access CLI of the appliances, list Three methods to access those devices and describe how you restrict and secure them.
Question 21: Explain in 50 to 100 words what a zone-based firewall is and provide an example of configuration commands.
Attachment:- Implement network security infrastructure for an organisation.rar