Critical Thinking Project
Yvonne Burton
Critical Thinking Project
SEC 235
Prof. Acocella
Due: October 16, 2020
1.
What are the symptoms of a routing loop? How can you identify a routing
loop?
A routing loop is a common problem with various types of networks, particularly computer
networks. They are formed when an error occurs in the operation of the routing algorithm, and as a
result, in a group of nodes, the path to a destination forms a loop. Chewed up bandwidth, repeated
messages along the data path, oddities with the routing table.
2.
Why might you escalate routing problems that you observe?
Routing rules
determine the users or groups that new ServiceDesk incidents are assigned to. The rules
also determine how incidents are escalated. ServiceDesk contains predefined routing rules
and other settings that are ready to use, but you can customize them to meet your
organization's requirements. Most organizations perform some level of customization.
3.
Why is a packet filtering firewall a stateless device?
To influence which packets
can transit the system and to apply special actions to packets as necessary, you can configure
stateless firewall filters. A stateless firewall specifies a sequence of one or more packet-filtering
rules, called filter terms.
4.
Which security device might you choose to restrict access by user
account
?
An application-level gateway
5.
What is the difference between a proxy and a reverse proxy?
Forward proxy is
used by the client such as a web browser. Reverse proxy is used by the server such as a web server.
proxy:
Private Network => Internet
reverse proxy:
Internet => Private Network
6.
Which security functions are included in an all-in-one security appliance?
URL filtering, content inspection, malware protection, spam filtering, switching functionality,
intrusion detection function, Tx uplink, bandwidth shaping, router and firewall.
7.
How do firewalls manage incoming and outgoing traffic?
Through ports 80 and
443 with a set of rules. Firewalls manage incoming traffic from the internet by disallowing
connections, malware and denial-of-service attacks. Outgoing traffic protects traffic from leaving a
network.
8.
What does the deny any statement do?
Denies any traffic coming in or out unless
having a permission to be transferred. Statement automatically added at the end of an ACL list, but
does not appear in the list itself.