1. Describe three basic types of network topologies and provide a sample diagram of each type. What security issues do you think would be a concern with any of the designs?
2. How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
3: Discuss the differences between an anomaly-based and a misuse-based detection model? Which would you use to protect a corporate network of 10,000 users? Why would you choose that model?
4: Pick three and describe how you deploy them to protect a small business network. Describe the protection each technology provides?
- 4 years ago