Q Choose TWO of the following Discussion Questions. Provide a detailed response (minimum 2 paragraphs each) to each of the questions you choose. You may post your response to both questions in one post. However, each question must meet the 2-paragraph minimum on it's own. 1. Describe "multi-tier" security and how it is used in the defense of a network. 2. Describe security "best practices" related to proxy servers. 3. Describe security "best practices" related to routers and switches. 4. Describe security "best practices" related to firewalls. 5. Describe security "best practices" related to virtual private networks (VPNs). 6. Conduct an Internet search on "Google Hacks" and describe the information that you found. 7. Describe an Intrusion Detection System (IDS) and how/why it is used. 8. What is two-factor or multi-factor authentication? Describe how it can help defend an account or network. 9. What is a rootkit and how can it be used to hack network devices? 10. Why is thorough and proper configuration of network devices a critical component to network defense?
View Related Questions