5. What is some of the security that goes into firewalls and routers; what is port isolation? Why do it?
The features that goes into firewalls and routers are
1. WPA2 Encryption:
This wpa2 encryption is used to set passwords to your routers.it will use the encryption process.
2. Guest network access:
Guest network is a best features. Whenever some want to connect in your network but don't want to reveal your password to them. Then you can use the guest account. Password is not necessary for a guest network.
3.Built in firewall.
Yes some routers will have built in firewalls to protect the computer from hacking or for preventing the traffic originating from the internet.
4. Enhanced parental control and time based restrictions.
These are used to keep a eye on how your children are using your network. You can also set a restricted time to access.
5. Private VLAN.
finally the best feature is private VLAN which is also called as port isolation. In this the VLAN contains switches. This switches are restricted to use only the given uplink. This restricted ports are called the private ports. Each VLAN contains number of private ports and a single uplink. This port isolation is used in case of hotels are in similar areas. In this we have a lot of room. Each room should be provided with internet access and with a secure way. So we use The port isolation.
5. What is some of the security that goes into firewalls and routers; what is port...
Describe and deploy security devices, including routers, firewalls, IntrusionDetection Systems, and honeypots.
Security Technology What are the types of firewalls that can be employed on the network? At what level they operate and how they can help protect the organization? When you configure a firewall, name some of the best practices for setting up the rules? Discuss the differences between different Firewall architectures and the provide a recommendation on when you use each architecture? How does NAT and PAT help in protecting the network with the use of the Firewall?
What are some of the rules you should follow with packet filtering firewalls?
Besides SNMP and Syslog, what are some other secure configuration measures for routers?
What is the correct order an IEEE 802.1D port goes through when transitioning to the forwarding state?
If I have two routers of 1 WAN port and 4 LAN ports and I only have one account to connect to the ISP. How do I connect them to accommodate 6 computers with a wired connection and connect them to ISP for shared internet access? Make sure every computer could visit each other without routing. (Use lines to connect the ISP, Router, Switch and Computers in paper and upload the picture using your phone) Computers Router WAN LAN ISP...
Question 2: Answer the following questions related to Firewall Technologies: What are the types of firewalls? What are security zones? What is a firewall DMZ?
Are cyberactivists cyber criminals? Why or why not? What are some of the security vulnerabilities of using WebApps? What are some of the benefits of addressing information security issues related to confidentiality, integrity, authenticity and anonymity in relation to threats and attacks? Why are they important?
5. What is a Port and why is it necessary? 6. What is a Socket? What is it used for? 7. Describe Multiplexing. Describe Segmentation. How are they different?
This question is regarding Computer Security; What do you think are some other security risks and threats that companies face and how are they overcoming and preventing these threats? PLEASE MAKE COPY PASTE AVAILABLE