Outcomes addressed in this activity:

Unit Outcomes:

  • Identify the placement and principles of firewall use.
  • Select authentication protocols from tunneling protocols.
  • Name remote access methods and technology.

Course Outcome:

Identify network attacks and mitigation responses.


In this assignment, you will examine key hardware devices in protecting computer networks. This includes examining firewalls, switches, and devices required for remote communication.

Assignment 1 Instructions

Using Credible Sources, Justify Your Answers to Questions

Answer the following 12 questions by selecting the one best answer for each. Cite your course texts, or other credible source, and provide a 50- to 100-word explanation of why you chose your answer for each question.

  1. You are aware that any system on the demilitarized zone (DMZ) can be compromised because the DMZ is accessible from the Internet. What should you do because of this?
    1. Implement both DMZ firewalls as bastion hosts.
    1. Implement every computer on the DMZ as bastion hosts.
    1. Implement the DMZ firewall that connects to the Internet as a bastion host.
  2. What is a disadvantage of a hardware firewall compared to a software firewall?
    1. It has a fixed number of interfaces available.
    1. It has lower performance capability than a software firewall.
    1. It is easier to make configuration errors than in a software firewall.
  3. Which type of firewall only examines the packet header information?
    1. Stateful firewall
    1. Kernel proxy firewall
    1. Packet-filtering firewall
  4. Which protocol should you configure on a remote access server to authenticate remote users with smart cards?
    1. EAP
    1. MS-CHAP
    1. CHAP
  5. Which protocol uses encryption to protect transmitted traffic on virtual private network (VPN) connections and supports the transmission of multiple protocols?
    1. HTTP
    1. L2TP over IPSec
    1. HTTPS
  6. An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization’s network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network. Which protocol should be used?
    1. PAP
    1. LDAP
    1. CHAP
  7. You have deployed a modem to allow remote users to connect to your network. You need to ensure that only users from specific locations can access your network using the modem. What should you deploy?
    1. RADIUS
    1. TACACS
    1. Callback
  8. What are characteristics of the cut-through switching method?
    1. Frames are discarded if they are runts or giants.
    1. It has less latency than the store-and-forward method.
    1. The cyclic redundancy check (CRC) is computed after a frame is copied to the switch’s buffer.
    1. Only the destination address is copied into the switch’s buffer before a frame is forwarded to its destination.
      1. Option a
      1. Option b
      1. Option c
      1. Option d
      1. Options a and c
      1. Options b and d
  9. Which of the following is the most critical item from a disaster recovery point of view?
    1. Data
    1. Communication links
    1. Hardware/software
  10. Business continuity and disaster recovery planning¬†primarily addresses the ________ principle of the CIA triad.
    1. Integrity
    1. Confidentiality
    1. Availability
  11. Risk is defined as the combination of which of the following?
    1. Probability of an event and its consequences
    1. Exposure and attack surface
    1. Risk landscape and attack modalities
  12. Risk management is a process aimed at achieving an optimal balance between which of the following?
    1. Maximizing profit and minimizing legal claims
    1. Realizing opportunities for gain and minimizing vulnerabilities and loss
    1. Maximizing controls and minimizing countermeasures

Assignment Requirements

Answers contain enough information to adequately answer the questions and contain no spelling, grammar, or APA errors

All papers are written by ENL (US, UK, AUSTRALIA) writers with vast experience in the field. We perform a quality assessment on all orders before submitting them.

Do you have an urgent order?  We have more than enough writers who will ensure that your order is delivered on time. 

We provide plagiarism reports for all our custom written papers. All papers are written from scratch.

24/7 Customer Support

Contact us anytime, any day, via any means if you need any help. You can use the Live Chat, email, or our provided phone number anytime.

We will not disclose the nature of our services or any information you provide to a third party.

Assignment Help Services
Money-Back Guarantee

Get your money back if your paper is not delivered on time or if your instructions are not followed.

We Guarantee the Best Grades
Assignment Help Services