Reference no: EM133192711
Questions
1. Discuss the process of security.
2. Discuss the steps of the security process.
3. Discuss the classes of network attackers.
4. Discuss, when analyzing network traffic, IP addresses can be characterized as...?
5. Discuss flagging packets in data capture and analysis.
6. Discuss within the realm of network security, which combinations best defines risk?
7. Discuss the characteristics of intrusion detection.
8. Describe Eavesdropping. What is it not?
9. Describe private/private IP addresses. Give examples.
10. Discuss firewall rules less likely to be found on a firewall installed between an organization's internal network and the Internet.