Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1: What are the five (5) latest network security issues? Write 30-60 words for each network security threat. Question 2: What is the

image text in transcribed

Question 1: What are the five (5) latest network security issues? Write 30-60 words for each network security threat. Question 2: What is the importance of the network security policy for a networked organisation along with the four (4) steps involved in network security policy? Write your answer in 150-200 words. Question 3: Answer the following questions: A. What do you mean by penetration testing techniques? Write your response in 50-100 words. B. What is the importance of penetration testing in terms of network security? Write your response in 50-100 words. C. Explain in Network Auditing in 100-150 words. Question 4: What are the capabilities of the following: A. Software perimeter solution B. Hardware Perimeter solution Write your response in 200-250 words. Question 5: Explain the reasons for using network logging analysis techniques in terms of network security perimeter issue? Write 100-150 words for your answer. Question 6: What do you mean by organisational network infrastructure keeping network security perimeter in prospect? Write your response in 100-150 words. Question 7: What are the five (5) network security technologies as per the perimeter design? Write 30-50 words for each. Question 8: A. Firewall What are the weaknesses of the following perimeter designs: Question 16: Answer the following questions: A. What are the two (2) components required to configure remote access VPN? Write your answer in 100-150 words. B. What might be the reason for setup of VPN Tunnel? Write your response in 50-100 words. Question 17: Answer the following questions: A. What are the VPN connectivity issues? B. List the steps involved in resolving VPN connectivity issues. Write your response in 100-150 for the answers. Question 18: Summarise the following test functionality for the following: A. Basic VPN tests B. Advanced VPN Tests Write 100-150 words for each test. Question 19: Answer the following questions: A. What are the six (6) common network security breaches and their solution? Write your response in 100-150 words. B. What are the different steps involved in documenting the test results? Write your response in 50- 100 words. (Ctrl) B. VPN Write 50-100 words for each Question 9: What are the six (6) best practices for deployment of firewalls as network security perimeter device? Write your answer in 130-180 words. Question 10: Summarise the configuration of the three legged firewall in simple words. Also use a screenshot to explain the three legged firewall network. Question 11: What are the four (4) best practices for firewall rules configuration including allow access? Write 150-200 words for your response. Question 12: What are the four (4) types of controls which firewalls provide as their advanced function? Write your answer in 100-150 words. Question 13: What are the reasons to back up of configuration of a firewall? Write 100-150 words for your response. Question 14: What are the eight (8) factors to consider while designing and configuring firewall migration in order to continue the service in case of update or device failure? Write 20-40 words for each factor Question 15: What are the steps involved for configuring site to site Virtual Private Networks (VPNs)? Write your answer in 130-170 words.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James Kurose, Keith Ross

7th edition

978-0133594140

More Books

Students also viewed these Computer Network questions