Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

5. Briefly describe management, operational, and technical controls, and explain when each would be applied as part of a security framework. 6. Using the following

image text in transcribed

5. Briefly describe management, operational, and technical controls, and explain when each would be applied as part of a security framework. 6. Using the following packet filtering rules, which rule would be matched and action taken when: a) TCP SYN packet (connection request) is sent from 222.22.1.1 port 1589 to 192.188.10.1 port 80? b) When a UDP packet is sent from 222.22.1.1 port 5532 to 207.80.51.67 port 53? c) When a UDP packet is sent from 207.80.51.67 port 53 to 222.65.1.1 port 5532? d) When a TCP ACK packet is sent from 192.188.10.1 port 80 to 222.22.1.1 port 1589? Source Port > 1023 Dest port Flags 80 Source Rule # Action Dest address Protocol address 1 allow 222.22.0.0/16 any TCP 2 allow any 222.22.0.0/16 TCP 3 allow 222.22.0.0/16 any UDP 4 allow any 222.22.0.0/16 UDP 5 deny any any all any ACK 80 > 1023 > 1023 53 53 > 1023 all all all

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Online Systems For Physicians And Medical Professionals How To Use And Access Databases

Authors: Harley Bjelland

1st Edition

1878487442, 9781878487445

More Books

Students also viewed these Databases questions

Question

1.Which are projected Teaching aids in advance learning system?

Answered: 1 week ago