Thomas LawlorApril 12, 2017CIS 134 – Networking TechnologiesAssignment Number: A09Assignment: Chapter 8 Review Questions: Pages 423 - 425, # 1 - 20Date Due: April 14, 2017Writing Center Visit Date: N/AWriting Center Tutor: N/A
1. Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?2. What wireless attack might a potential hacker execute with a specially configured transmitter?3. What kind of vulnerability is exploited by a ping of death?4. Which type of DoS attack orchestrates an attack using uninfected computers?5. What software might be installed on a device in order to authenticate it to the network?