Unit 3 Assignment - Running head Network 1 Unit 3 Assignment Kaplan University Protecting Network Infrastructure 2 Part 1 1 Create a table of the four

Unit 3 Assignment - Running head Network 1 Unit 3...

This preview shows page 1 - 4 out of 10 pages.

Running head: Network1Unit 3 Assignment: Kaplan University
Background image
Protecting Network Infrastructure2Part 1 1. Create a table of the four architectural layers of the TCP/IP suite. Include common protocols ateach layer. LayersProtocolsResponsibilityApplicationHTTP(s), SMTP, FTP,DNS,POP, SNMPCollect ad pass data toprotocol for deliveryHost-to-Host TCP UPDCreate session betweenNodes to pass dataInternet IP ARP ICMPRouters data between Nodes Network AccessPlace and remove packets onphysical hardware2. In a brief essay explain the concept of encapsulation. What is it and why is it important for you to understand? Are there encapsulation vulnerabilities that can be exploited? Exemplification is the procedure or "layering" the information parcels. Every layer adds particular information to guarantee the data is handled accurately. As the parcel is gone along a system every layer peruses the data relating to its part. There are numerous courses in which embodiment might be utilized to misuse a framework. Every layer has its own arrangement of vulnerabilities. Some vulned capacities are a part handshake assault, IP parodying, and Denial of Service. (Ding, 2009)
Background image
Protecting Network Infrastructure33. Designing a Secure Network. Take two of the technologies from the list in the textbook
Background image
Image of page 4

You've reached the end of your free preview.

Want to read all 10 pages?

  • Spring '15
  • Nicolas Ray
  • Screen Capture, Intrusion prevention system, Intrusion detection system

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture