Develop wlan security checklist

Assignment Help Computer Networking
Reference no: EM133011663

Assessment Task 1: Short Answer Questions

Implement network security infrastructure for an organisation

Question 1: Explain the main differences between the following network devices; a Switch, a Router and a Hub. For each provide:
1. A brief description of their OSI layer(s) the device operates in.
2. The device main function(s)
3. and methods to secure access to the device?

Question 2: What's next-generation firewall (NGFW)? List one example of the technology it uses that was not available in classic firewall technologies.

Question 3: Use the Cisco command line Interface to configure two routers to communicate over a serial link.

Note. Please provide screenshots of configuration below with your name and student id visible in a notepad document.
( Use Packet Tracer Or hardware appliances)

Question 4: What is the differences between remote-access and site-to-site VPN? describe the two main IPsec protocols? What OSI layer(s) IPsec framework can protect?

Question 5: You were assigned the IPv6 address range 2001:db8:acad:a::/64. Answer the following questions:
A device (host) with an IP address 2001:db8:acad:a::aefd/64 wants to send a Ping packet to another host with a destination IP address 2001:db8:acad:b::aefd/64.
Explain the communication process describing the interaction process between Network (Internet) layer and Data-link layer and the two network addressing types.

Question 6: What is RADIUS, TACACS+? What is their benefits to secure networking traffic? What are differences between Local AAA Authentication vs Server-Based AAA Authentication methods?

Question 7: What is ACL? List types of ACL that can be used in Cisco routers? Give an example of each type with configuration commands.

Note. Please provide screenshots of configuration below including your name and student id visible in a notepad document.
( Use Packet Tracer Or hardware appliances)

Question 8: List three modern cyber security threats and provide Tools and procedures to mitigate the effects of those threats.

Question 9: Based on the article below article identify and describe 2 network security design architectures (chapter 6.4)

Question 10: Briefly explain the following:
• Security authentication standards for WLANs.
• IEEE 802.11 standards.
• ISM bands
• WPA3
• WPS

Question 11: Talk About strengths and weaknesses of RC4 comparing to AES as a WLAN encryption systems.

Question 12: In Cryptology, explain the differences between Cryptography and Cryptanalysis providing one protocol for each and list the three primary objectives of securing communications.

Question 13: List and briefly describe:
• Four asymmetric public-key algorithms used today
• Four protocols that use asymmetric key algorithms.

Question 14: For network-based Intrusion Prevention System (NIPS):
• Describe IPS & IDS functions?
• Describe how you can update the Signature Database file?
• Compare between IPS & IDS from weakness and strength view?

Question 15: What's the Plaintext resulted from deciphering using Vigenere Cipher that produced the following Ciphertext?
"k tgxs vq ftmfg fghyqek kgkmtwva nt zqtegginrn apalkhwvr"
Note. Use the below information:
Cipher code: CISCOCCNAS
Alphabet: abcdefghijklmnopqrstuvwxyz
Use repeat mode.
No case sensitive.
Note. This process should be done manually by each student

Question 16: Why is it important to keep your anti-virus (AV) updates for defending against new cyberattacks?

Question 17: Identify at least two (2) security vulnerabilities of a proxy server and what methods used to mitigate them?

Question 18: When considering WLAN, describe the relationship between the OSI Physical & Data link layers

Question 19: Develop WLAN security checklist that can be deployed for a small business.

Question 20: In order to manage Cisco networking devices, you need to access CLI of the appliances, list Three methods to access those devices and describe how you restrict and secure them.

Question 21: Explain in 50 to 100 words what a zone-based firewall is and provide an example of configuration commands.

Attachment:- Implement network security infrastructure for an organisation.rar

Reference no: EM133011663

Questions Cloud

How much is the direct origination fee : On April 1, 2021, Lunar Company loaned P20,000,000 to Eclipse Company. How much is the direct origination fee
What will be the balance in the account : Suppose you deposit $1,000 today in an account that pays interest at an annual rate of 5%. What will be the balance in the account
What will be the company dividend six years from now : The last dividend it paid (T = 0) was $.90 a share. What will be the company's dividend six years from now
Identify the network security architecture : Implement and demonstrate your solution to the give brief in the Supporting document section of this assessment. You will be required to take screenshots
Develop wlan security checklist : Why is it important to keep your anti-virus (AV) updates for defending against new cyberattacks - Develop WLAN security checklist that can be deployed
Compute the cash payback period : Sheffield Company is considering a capital investment of $202,400 in additional productive facilities. Compute the cash payback period
Discuss types of information management accountant : Discuss types of information management accountant provide to assist management in a business that considers product quality to be of key strategic importance.
What total amount should be reported : Grand Company reported the following accounts at the end of reporting period; What total amount should be reported as non - current investments
Describe the type of costing system : Describe the type of costing system that is most appropriate for each type of service organisation. Identify the key features and give an example of a service.

Reviews

Write a Review

Computer Networking Questions & Answers

  Under what conditions should the page be copied locally

That page is initially remote, and it takes C nsec to copy it locally. Under what conditions should the page be copied locally in the absence of significant use by other processors?

  Windows server 2012 firewall

From the e-Activity, take a position that the benefits of using the built-in Windows Firewall are or are not superior to those offered by third-party software products that boast similar features and integration with the Windows Server 2012 operat..

  What is effect of singlebit transmission error in ciphertext

What is the effect of a single-bit (transmission) error in the ciphertext when using the ECB and CBC modes of operation?

  Prepare and save documents using word processing software.

Explore the Internet to discover at least two additional sites (other than Microsoft) that offer clipart, either free or for a price.

  What kind of ticket is held by kerberos tgs

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a __________.

  Complete ipv4 overview sections of routing and switching pro

Complete the following sections of "Routing and Switching Pro" in. TestOut LabSim: Section 5.1: IPv4 Overview. Section 5.2: IPv4 Address Classes. Section 8.1: IPv6 Addressing Overviewections of "Routing and Switching Pro" in.

  An application-level and a circuit-level one

What is a gateway, and what is the difference between an application-level and a circuit-level one?

  Benefits of the wireless local area network

What are primary benefits of the wireless local area network (WLAN)-based mobile computing system and wearable monitoring devices

  The differences between physical and logical address

What are the differences between physical and logical address, and why do we need logical addresses?

  How many addresses are left

An organisation has been granted a block of addresses starting with the address 172.154.68.0/22.

  Develop a web proxy

When your proxy receives an HTTP request for an object from a browser, it generates a new HTTP request for the same object and sends it to the origin server.

  Illustrate the concept of batch processing operating system

Discuss multiprocessing systems and explain how multiprocessing increases the utilisation of resources - Illustrate the concept of batch processing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd