1. Describe three basic types of network topologies and provide a sample diagram of each type. What security issues do you think would be a concern with any of the designs?

2. How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?

3: Discuss the differences between an anomaly-based and a misuse-based detection model? Which would you use to protect a corporate network of 10,000 users? Why would you choose that model?

4: Pick three and describe how you deploy them to protect a small business network. Describe the protection each technology provides?

    • 4 years ago
    • 10

    Purchase the answer to view it

    • attachment