Question

1. ACLs allow a router to control traffic within a network. The concept is very similar...

1. ACLs allow a router to control traffic within a network. The concept is very similar to how firewalls operate. Would a router configured with ACLs be a plausible replacement for a true perimeter firewall product such as a Cisco ASA or a SonicWall? Why or why not?

2. What’s the advantage of using a journaling file system over non-journaling? Under what circumstances might you use a non-journaling file system? Give examples of each type.

3. RAID is used in nearly all enterprise storage environments. What are some of the advantages to using RAID? When would one RAID level be used over another?

4. Extended ACLs allow for a great deal more granularity than do Standard ACLs. Give examples of circumstances when you would use either.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. I think a firewall is configured to perform a lot of functions with high optimizations than a router can perform.

For eg. A true firewall allows you to limit the commands available to a FTP client and also it can handle upto layer 7 controls. Also it has higher capacity for handling VPN traffic connections. Moreover, ACL's dont have the feature of stateful packet inspection or intrusion detection. They can only allow or deny a packet

2. Key ideas:

  • we use journaling file system when we have multiple users working on the same data and we need to maintain consistency.
  • When we have storage space for metadata, we tend to use journaling file system.
  • if there is high probabiity of crash, we can use journaling file system for conserving data.

3. Advantages of RAID

  1. It supports large size logical files that even exceed the limit set by OS
  2. It is useful for systems with abundant storage space
  3. It optimizes the I/O load transfer among several servers
  4. The read/write operation can be parallelized.

Raid 0 is used when we dont require fault tolerance and errors are very less probable

Raid 1 is used when we require higher efficiency and have large budget to buy extra drivers.

Raid 5 is used when we require fault tolerance and maintain consistency

Raid 10 is very costly but packs all the features including fault tolerance and fast rebuild time.

Add a comment
Know the answer?
Add Answer to:
1. ACLs allow a router to control traffic within a network. The concept is very similar...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of...

    Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of physician-centered and collaborative communication. How is the caregiver’s role different in each model? How is the patient’s role different? Answer: Physical-centered communication involves the specialists taking control of the conversation. They decide on the topics of discussion and when to end the process. The patient responds to the issues raised by the caregiver and acts accordingly. On the other hand, Collaborative communication involves a...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated...

    10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated sludge operation that adversely affect effluent quality with origins in the engineering, hydraulic and microbiological components of the process. The real "heart" of the activated sludge system is the development and maintenance of a mixed microbial culture (activated sludge) that treats wastewater and which can be managed. One definition of a wastewater treatment plant operator is a "bug farmer", one who controls the aeration...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT