Identify Protocol Ports And Weakness Discussion
WE WRITE ESSAYS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your project
Write My Essay For MeAnswer the following questions:
1. What is the difference between TCP and UDP? Why would you use one over the other?
2. What are some advantages of IPv6 over IPv4? Why do you think it is taking so long for IPv6 to be adopted?
3. Research the QUIC Protocol. What network layer does QUIC operate at? What use cases does QUIC seek to resolve?
4. What is the difference between an open port and a filtered port? List five common ports that may be open on a corporate network. Why is this important to know from cybersecurity aspect?
5. How is encapsulation used in network communications?
6. Both Ethernet and IP are involved with delivering data. Compare and contrast these protocols; be sure to discuss what OSI layers they operate and describe specific cases for selecting one over the other.
7. If you wanted to sniff internet-bound network traffic for multiple subnets on a corporate network, where could you set up a sniffer?
Part 2
I’ve attached an incomplete network diagram for your analysis. Based on this diagram, please provide all of the following information:
1. Identify all ports and protocols used for each network service present on this diagram. Present these results as a table.
2. Where could we access traffic for analysis for the RDP server if we suspect a breach of this device? Assume switches support spanning.
3. Assuming some users will require access to multiple servers and desktops in the network, describe best practices associated with username and password selection. What are the dangers of using the same user name and password to access the FTP server and to log into your Windows domain account?
4. The email server does not support TLS for PoP3 due to lack of knowledge by the admin. What risks are opened up by this misconfiguration?
5. Create a new network diagram with additional documentation to include:
· IP addresses (make up an address scheme),
· ports in use
· where one could/should insert security devices such as firewalls to limit exposure to threats
Note: There are multiple valid approaches to this deliverable, and you may use Microsoft PowerPoint, Microsoft Word, Microsoft Visio, or Apache OpenOffice to create your network diagram.
The post Identify Protocol Ports And Weakness Discussion appeared first on Pro-Dissertation.
Write my Essay. Premium essay writing services is the ideal place for homework help or essay writing service. if you are looking for affordable, high quality & non-plagiarized papers, click on the button below to place your order. Provide us with the instructions and one of our writers will deliver a unique, no plagiarism, and professional paper.
Get help with your toughest assignments and get them solved by a Reliable Custom Papers Writing Company. Save time, money and get quality papers. Buying an excellent plagiarism-free paper is a piece of cake!
All our papers are written from scratch. We can cover any assignment/essay in your field of study.
