cissp essay questions each with fully knowledgeable detailed info with atleast half a page or more to each question - no excusses!

profilepatterson

1. Communications within a computer network rely on numerous components for data to traverse from the initial sender of a message or file to the receiver at the distant end of the communication path. In addition to the media that the data travels across, the devices that guide the data packets through the network, and the protocols that establish end-to-end connectivity and negotiate the communication, network services play a critical role in providing the necessary addressing and name resolution services. Describe the following services and their role in network communications: ARP, DHCP, ICMP, SNMP, and DNS. 

 

2. Modern organizations rely on the Internet for information and research necessary to stay competitive but this access can come with significant risk if they don’t take the necessary steps to safeguard their internal resources from outside attackers. In this week’s reading, various types of firewalls and firewall configurations were discussed. Describe the terms bastion host, DMZ, dual-homed firewall, screened host, and screened subnet and their roles in firewall architectures.

 

3. Many organizations employ a mobile workforce and/or provide the option of telework to their employees to allow them to work from home. In both situations, a secure means of accessing the corporate network remotely must be provided. Discuss the four main tunneling protocols used to provide virtual private network access between remote users and their corporate network.

 

4.Describe the following types of network attacks: denial of service (and DDoS), malformed packet attacks, flooding,  sniffing, Ransomware, DNS hijacking, and drive-by download. Give an example of a DoS or DDoS attack and describe how it overwhelms a target system.

 

5. Depending on their needs and budget, companies can choose from a variety of perimeter security options. Discuss the differences between packet-filtering, stateful inspection, proxy, dynamic packet filtering, kernel proxy, and next generation firewalls and how they provide security filtering to protect the perimeter.

 

 

    • 7 years ago
    • 25
    Answer(2)

    Purchase the answer to view it

    blurred-text
    NOT RATED

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      order_66008_158359.doc