Chat with us, powered by LiveChat Respond questions | WriteDen

Respond questions

Respond questions
Respond with at least 3 sentences each question
The next morning at 8 o’clock, Kelvin called the meeting to order. The first person to address the group was the network design consultant, Susan Hamir. She reviewed the critical points from her earlier design report, going over the options it had pre-sented and outlining the tradeoffs in those design choices. When she finished, she sat down and Kelvin addressed the group again: “ We need to break the logjam on this design issue. We have all the right people in this room to make the right choice for the company. Now here are the questions I want us to consider over the next three hours.” Kelvin pressed the key on his PC to show a slide with a list of discussion questions on the projector screen.
1. What questions do you think Kelvin should have included on his slide to start the discussion?

2. If the questions to be answered were broken down into two categories, they would be cost versus maintaining high security while keeping flexibility. Which is most impor-tant for SLS?

Respond with at least 3 sentences each question
Miller Harrison was still working his way down his attack protocol. Nmap started out as it usually did: giving the program identification and version number. Then it started reporting back on the first host in the SLS network. It reported all of the open ports on this server. Then the program moved on to a second host and began reporting back the open ports on that system, too. Once it reached the third host, however, it suddenly stopped. Miller restarted Nmap, using the last host IP as the starting point for the next scan. No response. He opened up another command window and tried to ping the first host he had just port- scanned. No luck. He tried to ping the SLS firewall. Nothing. He happened to know the IP address for the SLS edge router. He pinged that and got the same result. He had been blackholed— meaning his IP address had been put on a list of addresses from which the SLS edge router would no longer accept packets. This was, ironically, his own doing. The IDPS he had been helping SLS configure seemed to be working just fine at the moment. His attempt to hack the SLS network was shut down cold.
Questions: 1. Do you think Miller is out of options as he pursues his vendetta? If you think there are additional actions he could take in his effort to damage the SLS network, what are they?
 2. Suppose a system administrator at SLS happened to read the details of this case. What steps should he or she take to improve the company’s information security program?
Click here for more on this paper…….
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted…..
Complete exercises
Respond with at least 3 sentences each question
1. Using the Web, search for “ software firewalls.” Examine the various alternatives avail-able and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.
2. Using Figure 6- 15, create rule( s) necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the soft-ware Timbuktu. This requires researching the ports used by this software packet.
3. Using Figure 6- 15, suppose management wants to create a “ server farm” that is configured to allow a proxy firewall in the DMZ to access an internal Web server ( rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What advantages and disadvantages are there to this implementation?


Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of 

Step 1

To make an Order you only need to click ORDER NOW and we will direct you to our Order Page at WriteDen. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
 Deadline range from 6 hours to 30 days.

Step 2

Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.


Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.