Identify Protocol Ports And Weakness Discussion
Answer the following questions:
1. What is the difference between TCP and UDP? Why would you use one over the other?
2. What are some advantages of IPv6 over IPv4? Why do you think it is taking so long for IPv6 to be adopted?
3. Research the QUIC Protocol. What network layer does QUIC operate at? What use cases does QUIC seek to resolve?
4. What is the difference between an open port and a filtered port? List five common ports that may be open on a corporate network. Why is this important to know from cybersecurity aspect?
5. How is encapsulation used in network communications?
6. Both Ethernet and IP are involved with delivering data. Compare and contrast these protocols; be sure to discuss what OSI layers they operate and describe specific cases for selecting one over the other.
7. If you wanted to sniff internet-bound network traffic for multiple subnets on a corporate network, where could you set up a sniffer?
Part 2
I’ve attached an incomplete network diagram for your analysis. Based on this diagram, please provide all of the following information:
1. Identify all ports and protocols used for each network service present on this diagram. Present these results as a table.
2. Where could we access traffic for analysis for the RDP server if we suspect a breach of this device? Assume switches support spanning.
3. Assuming some users will require access to multiple servers and desktops in the network, describe best practices associated with username and password selection. What are the dangers of using the same user name and password to access the FTP server and to log into your Windows domain account?
4. The email server does not support TLS for PoP3 due to lack of knowledge by the admin. What risks are opened up by this misconfiguration?
5. Create a new network diagram with additional documentation to include:
· IP addresses (make up an address scheme),
· ports in use
· where one could/should insert security devices such as firewalls to limit exposure to threats
Note: There are multiple valid approaches to this deliverable, and you may use Microsoft PowerPoint, Microsoft Word, Microsoft Visio, or Apache OpenOffice to create your network diagram.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more