Implementing Firewall Technologies,computer science homework help
SEC453Study Guide Chapter 6 – Implementing Firewall Technologies1. What are the two specific areas of the networkthat need to be secured? 2. What basic security services are provided toapplications by the operating system?3. What is the difference between a “directapplication attack” and an “indirect application attack”?4. List techniques that can be implemented to helpprotect an endpoint from operating system vulnerabilities.5. What are the two primary Cisco offeringsdesigned to ensure robust endpoint security?6. Identify four important features of Cisco’sNetwork Admission Control system.7. How is a buffer overflow attack caused in anEthernet switch?8. Provide a brief description of a MAC addressspoofing attack.9. What tool is commonly used to launch a MACaddress buffer overflow attack?10. Howis storm control implemented by a switch?11. Howis a VLAN hopping attack implemented?12. Whatis the best way to mitigate the VLAN hopping attack?13. Listswitch security commands and explain their purpose.14. Explainthe three different violation modes.15. Whymight an administrator use the “sticky” modifier?16. Identifythe features of SNMP MAC address notification system.17. Whatis the purpose of the port fast feature of an Ethernet switch?18. Whatcommands are used to enable the port fast feature?19. Whatis the purpose of implementing the BPDU guard on an Ethernet switch?20. Thereare two different ways to enable BPDU filtering. What are the differencesbetween the two methods?21. Whatis the purpose of enabling root guard on an Ethernet switch?22. Whatis the difference between using BPDU guard and using root guard?23. Whatis a storm attack and how can it be mitigated?24. Whatare the guidelines for securing VLAN trucks?25. Whatis a SPAN port and how can it be used to protect your network? 26. Whatcommand will allow you to verify the configuration of a SPAN port?27. Whatis the purpose of the PVLAN Edge feature?28. Whatcommand will enable PVLAN Edge protection on an interface?29. Providea list of the guidelines for the protection of layer 2.30. Comparean autonomous AP to a controller-based AP. How are they different?31. Whatare the characteristics of the lightweight AP model? What advantages does itoffer?32. Identifythreats to a wireless infrastructure.33. Identifysome of the tools that are used by wireless network attackers.34. Whatcomponents are typically found in a VoIP system?35. Identifysome of the threats to the VoIP system.36. Whyis it advantageous to place voice traffic on its own VLAN?37. Inwhat ways does an ASA protect a VoIP system?38. Whatis the primary side effect of encrypting VoIP traffic?39. Whatis a SAN, and what business needs are addressed by it?40. Identifythe six critical areas of a SAN that should be secured.
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question