Reference no: EM133069621
ICTNWK546 Manage Network Security
TASK 1 - Network Security Plan
REPORT
Make a Network Security Planning, including:
a. Description
i. Based on the network diagram given above, give a description of the existing network and current security status
b. Network Assets
i. List the network assets based on the diagram above
c. Risk Management Plan (Minimum 10 Threats)
d. Security Policy
i. Network Security Policy (1 paragraph each)
1. Acceptable Use Policy
2. Email and Communications Activities
3. Antivirus Policy
4. Identity Policy
5. Password Policy
6. Encryption Policy
7. Remote Access Policy
ii. Current Security Technologies Inventory (1 paragraph each)
iii. Important Digital Assets (1 paragraph)
iv. Security Breach (1 paragraph)
v. Current and Future Needs (1 paragraph)
e. Proposed Implementation of Security
i. For 3 mitigation strategy from part C, give an explanation of the technology you are going to implement in the network (1 paragraph for each explanation)
f. Incident Reporting Process
g. Revised Network Designs
i. Change the network design given and add all the security measures based on part E
h. Analysis Methods
i. Explain how you will manage and monitor the network (what tools you are going to use)
i. Testing Procedure
i. Give an explanation on how you are going to test each implementation in Part E
j. Sign-off document
Question 1. What is a Phishing attack?
Question 2. Describe one network security threat mitigation technique
Question 3. What is Threat Modelling?
Question 4. What IPsec protocol provides confidentiality for the payload of data packets?
Group of answer choices
(a) ISAKMP
(b) ESP
(c) AH
(d) IKE
Question 5. What type of attack might a hacker use to feed a client false information about the identity of a server?
(a) DNS Poisoning
(b) Replay
(c) Smurf
(d) Bluejackin
Question 6. A trap for hackers.
Group of answer choices
(a) firewall
(b) spoofing
(c) Honeypot
(d) Honey net
Question 7. A comprehensive security product that includes protection against multiple threats. A product typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package.
Group of answer choices
(a) Secure Content Management (SCM)
(b) Intrusion detection systems (IDS)
(c) Network Access Protection (NAP)
(d) Unified Threat Management (UTM)
Question 8. A solution designed to detect unauthorized user activities, attacks, and network compromises.
Group of answer choices
(a) Secure Content Management (SCM)
(b) Intrusion prevention systems (IPS)
(c) Intrusion detection systems (IDS)
(d) Unified Threat Management (UTM)
Question 9 occurs when an attacker is able to intercept a DNS request and respond to the request before the DNS server is able to.
Group of answer choices
(a) Spoofing
(b) DNS spoofing
(c) DNS poisoning
(d) Honeypot
Question 10. Which of the following contains the primary goals and objectives of security?
Group of answer choices
(a) A network's border perimeter
(b) The CIA Triad
(c) A stand-alone system
(d) The Internet
Question 11. Vulnerabilities and risks are evaluated based on their threats against which of the following?
Group of answer choices
(a) One or more of the CIA Triad principles
(b) Data usefulness
(c) Due care
(d) Extent of liability
Question 12. Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects?
Group of answer choices
(a) Identification
(b) Availability
(c) Encryption
(d) Layering
Question 13. What is the primary goal of change management?
Group of answer choices
(a) Maintaining documentation
(b) Keeping users informed of changes
(c) Allowing rollback of failed changes
(d) Preventing security compromises
Question 14. What is the primary objective of data classification schemes?
Group of answer choices
(a) To control access to objects for authorized subjects
(b) To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity
(c) To establish a transaction trail for auditing accountability
(d) To manipulate access controls to provide for the most efficient means to grant or restrict functionality
Question 15. Which of the following is typically not a characteristic considered when classifying data?
Group of answer choices
(a) Value
(b) Size of object
(c) Useful lifetime
(d) National security implications
Question 16. What are the two common data classification schemes?
Group of answer choices
(a) Military and private sector
(b) Personal and government
(c) Private sector and unrestricted sector
(d) Classified and unclassified
Question 17. Which of the following is the lowest military data classification for classified data?
Group of answer choices
(a) Sensitive
(b) Secret
(c) Sensitive but unclassified
(d) Private
Question 18. Which commercial business/private sector data classification is used to control information about individuals within an organization?
Group of answer choices
(a) Confidential
(b) Private
(c) Sensitive
(d) Proprietary
Question 19. Data classifications are used to focus security controls over all but which of the following?
Group of answer choices
(a) Storage
(b) Processing
(c) Layering
(d) Transfer
Question 20. What is the biggest computer security threat in most environments?
Question 21. What would a root security policy include?
Question 22. Research and discuss Unified threat management (UTM) as a tool for managing network security.
Attachment:- Manage Network Security.rar