Reference no: EM1379561
Question1. Name two benefits of Stateful Inspection Packet Filtering Routers.
Question2. Name two benefits that firewalls add to a network
Question3. Name two benefits of the Dual Homed Bastion Host firewall architecture
Question4. Name two benefits of the Screened Subnet or DMZ Firewall architecture
Question5. You just discovered a knowledgeable insider has planted a logic bomb in your shipping applications and is demanding $50,000,000 to disable it. What do you do
Choose the best answer:
Question6. The three devices most commonly used for perimeter protection are:
A) Application servers, firewalls, and databases
B) Routers, Firewalls, and IDSs
C) Web server, application server, database serv
D) Router, Web server, Firewall
Question7. What are the two types of detection that an IDS can provide?
A) Misuse and anomaly
B) Denial of service detection and HTTP attacks
C) Fragment and offset
D) ICMP and TCP
Question8. The three things that must be considered for the planning and implementation of security controls are:
A- Threats, assets, and business objectives
B- Threats, vulnerabilities, and risks
C- Vulnerabilities, secret keys, and exposures
D- Exposures, threats, and countermeasures
Question9. Separation of Duties is based on which principle?
A-An operator does not know more about the system than the minimum required to do the job
B-Two operators are required to work in tandem to perform a task
C-Operator duties are rotated frequently
D- Operators have different duties to prevent one person working alone to compromise the system
Question10. An orchestrated attack on an Internet site intended to disrupt communications is called
A- Blended attack
B- Coordinated attack
C- Denial of Service attack
D- Penetration test.
Explain the concepts of nat and ipv6
: At present we have a huge problem with advertising corporations which are making profiles of people by collecting their information.
|
Finding server side software
: Find the Internet to search server side software that is needed to be installed on the hospital's servers to support access by your local hospital doctors to patients' data using their cellular phones or PDAs.
|
Performing the maintenance
: A hard drive must be managed to be used most efficiently. This maintenance with deleting old files, defragmenting a drive so that it does not waste space, as well as, from time to time, discovering and attempting to correct disk failures.
|
Explaining the type of firewall
: Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?
|
Stateful inspection packet filtering routers
: Name two benefits of Stateful Inspection Packet Filtering Routers. Name two benefits that firewalls add to a network
|
Solving passwords problems
: As we all know about problems with people and passwords and how technology can mitigate some of them. What types of problems do you assume implementing these technologies for people might cause?
|
Creating hipo charts and decision tables
: Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,
|
Question about vpn communications
: Discuss how routers and firewalls and IDSs inspect inbound and outbound traffic and explain how we use those features to our benefits in securing the network.
|
Catching exception
: Create a program that shows how various exceptions are caught with catch Exception
|