How you would protect the server using an access list

Assignment Help Computer Networking
Reference no: EM131492048

Question: 1. Your network is experiencing an excessive amount of pings to your network server. The pings are from outside the network. Someone suggests that you set an access list to block ICMP packets coming into the network. How would you respond?

2. A Web server has been set up for use internal to a network (an intranet server). No outside users should be able to access the server. Describe how you would protect the server using an access list.

Reference no: EM131492048

Questions Cloud

What features of a data packet does an intrusion box examine : What command is used to view the number of times an access list has been matched?
Application program be controlled through apis : Why is it so important that access to system services by application program be controlled through APIs?
Odd dividend policy-how much will you pay for share today : odd dividend policy-how much will you pay for a share today?
What are graph data structures in java : What are graph data structures in Java? What do they consist of? What makes them better or worse than other data structures?
How you would protect the server using an access list : Your network is experiencing an excessive amount of pings to your network server. The pings are from outside the network.
Prepare a system flowchart of the sales procedures : HI5019 STRATEGIC INFORMATION SYSTEMS T1 2017 ASSIGNMENT - LITERATURE REVIEW. Describes and prepare a system flowchart of the sales procedures
List two advantages of wireless networking : What are the three areas defined for the IEEE 802.11 standard?
Define a pseudorandom sequence as it applies to fhss : Describe the frequency spectrum for the DSSS channels in 802.11b wireless networking.
How much will you pay for the stock and current stock price : Alexander Corp. will pay a dividend of $4.20 next year. The company has stated that it will maintain a constant growth rate of 4.5 percent a year forever.

Reviews

Write a Review

Computer Networking Questions & Answers

  Decision tree

One major issue for any decision tree algorithm is how to choose an attribute based on which the data set can be categorized and a well-balanced tree can be created. The most traditional approach is called the ID3 algorithm proposed by Quinlan in 198..

  What kind of lan will your team design for this company

The firm also wants to make sure that every department has very fast access to the LAN, and, of course, it wants the LAN to remain up at all times

  What are the two limitations of static packet filtering

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

  Different professional networking opportunities

Identify and provide a rationale for the opportunities you plan on pursuing for this course. Describe how you will approach the opportunity.

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

  File transfer protocol

The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP

  What are some of the major strategies and risks

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  What are the benefits and drawbacks of using server core

ITNW1316- What are the benefits and drawbacks of using Server Core for this branch office?What are some things you should do to set up this server management environment?

  Supplies to reconnect the two computers

You checked your network supplies closet and found that you have various networking equipments and supplies including routers, switches, hubs, Ethernet NICs, 801.11b USB Network Adapter, various cables and connectors, etc. What can you use from yo..

  What is the rationale for acquiring professional credentials

List and describe the criteria for selecting information security personnel

  Assignment understanding of virtualization technology

Compare and contrast the Big 3 hypervisor options available in the market on the basis of factors such as: Features

  Discuss the pros and cons

Per the text, with Server 2012, the option for policy based IP address assignment is available. Discuss the pros and cons of using policy based assignments to segregate mobile devices from the other machines on the network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd