Week 7 Critical Thinking Case Project Yvonne Burton

.docx

School

Peirce College *

*We aren’t endorsed by this school

Course

235

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by AgentFlowerCrow

Critical Thinking Project Yvonne Burton Critical Thinking Project SEC 235 Prof. Acocella Due: October 16, 2020 1. What are the symptoms of a routing loop? How can you identify a routing loop? A routing loop is a common problem with various types of networks, particularly computer networks. They are formed when an error occurs in the operation of the routing algorithm, and as a result, in a group of nodes, the path to a destination forms a loop. Chewed up bandwidth, repeated messages along the data path, oddities with the routing table. 2. Why might you escalate routing problems that you observe? Routing rules determine the users or groups that new ServiceDesk incidents are assigned to. The rules also determine how incidents are escalated. ServiceDesk contains predefined routing rules and other settings that are ready to use, but you can customize them to meet your organization's requirements. Most organizations perform some level of customization. 3. Why is a packet filtering firewall a stateless device? To influence which packets can transit the system and to apply special actions to packets as necessary, you can configure stateless firewall filters. A stateless firewall specifies a sequence of one or more packet-filtering rules, called filter terms. 4. Which security device might you choose to restrict access by user account ? An application-level gateway 5. What is the difference between a proxy and a reverse proxy? Forward proxy is used by the client such as a web browser. Reverse proxy is used by the server such as a web server. proxy: Private Network => Internet reverse proxy: Internet => Private Network 6. Which security functions are included in an all-in-one security appliance? URL filtering, content inspection, malware protection, spam filtering, switching functionality, intrusion detection function, Tx uplink, bandwidth shaping, router and firewall. 7. How do firewalls manage incoming and outgoing traffic? Through ports 80 and 443 with a set of rules. Firewalls manage incoming traffic from the internet by disallowing connections, malware and denial-of-service attacks. Outgoing traffic protects traffic from leaving a network. 8. What does the deny any statement do? Denies any traffic coming in or out unless having a permission to be transferred. Statement automatically added at the end of an ACL list, but does not appear in the list itself.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help