1. Network Devices, Topologies, and Network Attacks

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

After reading/viewing this week’s materials, please respond to one or more of the following questions.

  1. Describe the functions of hubs/repeaters, bridges, switches, routers, and gateways. At what layers of the OSI model does each device operate?
  2. Describe the different Wireless standards within the 802.11 family. What is a rogue access point, and what do we have to worry about?
  3. Describe the differences between bus, ring and star topologies. List the various wiring standards that are available for use within these topologies.
  4. From the videos, pick one hacker profiled and describe the types of attacks they used in exploiting vulnerabilities of the networks that they targeted. What opening did they gain access through? How were they detected?

2.Physical Security Controls

After reading/viewing this week’s materials, please respond to one or more of the following questions.

  1. Identify the malicious threat sources to physical security and their corresponding countermeasures.
  2. Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?
  3. Describe three perimeter intrusion detection systems from the physical security domain and give an example of one that you have seen deployed either at work or another location that you are familiar with

    The TCP/IP Model

    After reading/viewing this week’s materials, please respond to one or more of the following questions.

    1. Explain the TCP/IP Model. How do the layers map to the OSI Model layers?
    2. The Transport layer provides two service protocols: UDP and TCP. Explain the differences between the two protocols in terms of guaranteed vs. non-guaranteed service and connection-oriented versus connectionless communication.
    3. What is a DoS attack? What is the main target of DOS in terms of Confidentiality, Integrity and Availability? Give an example of a common DoS attack

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.