Answer question correctly and in complete sentences with proper grammar.
Question 1. Consider the network below. Describe the network, including the role of switch, firew...
You are given the following "informal firewall policy" details to be implemented using the firewall topology illustrated in slide # 22 (Chapter 9) Present the rules for the external and internal firewalll in a table format. a) Email may be sent using SMTP in both directions through the firewall, but it must be relayed via the DMZ mail gateway. External email must be destined for the DMZ mail server. b) Users inside may retrieve their e-mail from the DMZ mail...
1. Let’s consider the network shown in Figure 1 where Snort is
deployed.
1.1: In Figure 1, why is Snort deployed in the DMZ instead of
the Internal Network? (9 points)
1.2: In Figure 1, say True or False to the following statement:
“Snort can see both incoming packets from the left firewall and
outgoing packets from the right firewall”. (5 points)
1.3: In Figure 1, assume a packet P matches the following Snort
rule when the packet is analyzed...
Question 2 (20 marks) – Improving network design Jim is
impressed by your report and asks you to write a proposal to
improve the network, although his budget is limited he tells you
that if you can justify your design choices you may be able to
purchase some more equipment. You will need to provide a new
network design diagram in PowerPoint format, thankfully Jim has
included a couple of slides with various network equipment elements
that you can use...
1- It is advisable to have more than of form of defence, justify the advantages and disadvantages of that approach? 2- In what case you would recommend a screening router firewall architecture over screened host architecture? 3- You need to implement defence in depth for your entire organization. Your management is interested in deploying intrusion prevention systems. Your goal is to protect. 1) All the traffic flowing through a network 2) Endpoints from intrusions. Analyse the technologies you will be...
Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...
Consider a home network consisting of a router, a Web server hosting your own website, and 4 different wireless devices. Suppose that all nodes on the home network are addressable/reachable by their IPs only. Answer the following: a) How does your router get assigned its IP? What is the nature of such IP (e.g., static vs dynamic, global vs local, public vs private)? b) How do the different wireless devices get assigned their IPs? What is the nature of such...
hi I want short answer ,please Q/Describe Network security solutions including VPN, firewalls, proxy server, IDS,
Question 7: Figure1 below show a typical internetwork. Show where the devices listed in figure 2 are located in the network shown in the figure1. This means show where the devices can be found (in your opinion) in the given internetwork. Residential Area Internet Link Phone Line Wide Area Packet-Switched Network Organization Network Data Center Network University OCampus Nerwork To Residential Phone Lines Data- Server base Rack Network ISP Servers Node Public-Switched Telephone Network (PSTN) Wide Area Wireless Network Figure...
A security analyst performs various types of vulnerability
scans. Review the vulnerability scan
results to determine the type of scan that was executed and if a
false positive
occurred for each device.
Instructions:
Select the Results Generated drop-down option to determine if the
results were generated from a credentialed
scan, non-credentialed scan, or a compliance scan.
For ONLY the credentialed and non-credentialed scans, evaluate the
results for false positives and check the
findings that display false positives. NOTE: If you...
answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT ONE): a)true b)false 2)Cross-site scripting attacks attempt to bypass the browsers security checks to gain elevated access privileges to sensitive data belonging to another site(SELECT ONE): a)true b)false. 3)Denial of service attacks target the confidentiality and integrity of a system or network.(SELECT ONE): a)true b)false 4)the wireless access point provides a connection to the network or service(SELECT ONE): a)true b)false 5)blocking ICMP packets may...