This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Unit 8 assignment

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Unit 8 assignment

Qsn1.

Answer B-VPN

The IPsec protocol offers end-user traffic by ensuring authentication and confidentiality of data packet. “The IPsec framework is a suite of IETF standards that provides for secure transmission of data over unsecured networks, for example the Internet. IPsec provides protocols to secure communications at the Network Layer along with a mechanism for exchanging identity and security protocol management information (Tech Target, 2008).”

Qsn2.

Answer C-netstat

Netstat is an important tool that helps in checking network and internet connections, generating displays showing network protocol and status (Tech Target, 2008). It is advisable to monitor network connection on your pc to investigate any form of holdups and anomalies.

Qsn3.

Answer C-armored virus
Armored viruses are PC viruses that have found to be risky as it is developed to protect itself from any attempt to detect it. This makes it possible to attack the computer system without being noticed. Armored viruses are developed to make it hard to eliminate after infecting a system.

Qsn4.

Answer C-VoIP

Phreaker is an individual who tries to have access to telephone network illegally by making free long-distance phone calls.  The Phreaker attacks try to access the voice over internet protocol (Rouse, 2019).

Qsn5.

Answer B-HTTPS

HTTPS is the secure method to send data between a web browser and a web server. It is mainly developed to increase security data transfer (Cloud Flare, 2020). The HTTPS is critical, particularly during transmission of sensitive data such as organizational and personal information.

Qsn6.

Answer A- It sends malformed packets to the intended victim

Teardrop attack occurs when a user sends deliberately fragmented information packets to the target device. As the packets overlap error occurs in the system tries to resemble the packet (F5 Glossary, 2020). This makes it possible for attacks to take advantage of the system to launch a fatal crash in the application handling the packet.

Qsn7.

Answer F- option d and e only

“The transport layer controls the reliability of communications through flow control, segmentation, and error control. Two great examples of transport protocols are TCP (as in TCP/IP) and UDP. Understanding the differences between TCP and UDP really helps when troubleshooting and when trying to understand the results from a packet capture. TCP, or the Transmission Control Protocol, is connection oriented.”

Qsn8.

Answer E- all of the options

There are a number of very simple steps you can take to protect your wireless network (Tech Target, 2008). For many of these, you will have to access the router’s configuration utility (check your manual on how to do this, you usually have to type an IP address in the browser such as 192.168.0.1 or 192.168.1.1).”

Qsn9.

Answer C-an acceptable probability of occurrence

The project manager needs to understand risks that may affect operations in any organization and prepare strategies to deal with it (Hill, 2016). Effective risk management strategy must identify, assess and prioritize any risk that may occur. Planning for risk is essential for any business.

Qsn10.

Answer C-residual risk is acceptable.

Effective risk management is vital for any organization; therefore, understanding and risk may help organizations in reducing risk impacts in case it strikes (Hill, 2016). Risk residual is the amount of risk left after the inherent risk have been reduced or controlled.

Qsn11.

Answer A- replacement cost

Value of physical assent is mainly based on its replacement cost because it is the amount required to replace an asset in case it is damaged or lost.

Qsn12.

Answer A- Business system analysts

“Business systems analysts are responsible for the analysis, adjustment and restructuring of different aspects of a business. It is a business systems analyst’s responsibility to ensure that a business’s structure is meeting top output efficiency. Business system analysts work closely with individuals at all levels of employment to see what is and isn’t working in the most efficient manner possible (Hill, 2016).”

References

F5 Glossary, (2020). What Is a Teardrop Attack? Retrieved https://www.f5.com/services/resources/glossary/teardrop-attack

Cloud Flare, (2020). What Is HTTPS? Retrieved https://www.cloudflare.com/learning/ssl/what-is-https/

Rouse, M. (2019). What is phreak? Retrieved from https://searchsecurity.techtarget.com/definition/phreak

Tech target (2020). IPsec protocol details for implementing VPNs. Retrieved from https://searchnetworking.techtarget.com/feature/IPsec-protocol-details-for-implementing-VPNs

Hill, B. (2016). What Are the Parts of an Effective Risk Management Program? Retrieved from https://smallbusiness.chron.com/parts-effective-risk-management-program-80857.html

 

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask