Network security

Network security
You may not collaborate with others or use online resources. You are on your honor. Type your answers, print and return. You may hand draw pictures if you wish on the back or on separate sheets. Make sure to label them. Good Luck.

1. Solve the following Diffie-Hellman key exchange:

X=3, P=7, A = 2, B = 4

Show all the steps and all the work. Do not solve the equations until the end so that I can see that you understand the process. (10 points)

2. Draw the TCP/IP model for networking and include the network security measures that you believe are appropriate for each level – you may add levels to the model if you want as per our recent class discussions. (10 points)
3. You are the network security specialist working for a company and you are told to create a secure VPN service, which will allow 200 persons to work from home. 100 of them (call them trusted employees in your answer) are required to connect over the Internet and have full access to everything on the corporate LAN (print servers, file servers, etc.); The other 100 persons (call them the limited group) shall have access only to application X on the Alpha Server. (40 points divided evenly as per the questions that follow)
a. Draw the chart listing all of the possible VPN configuration combinations. Circle the two squares that correspond to the choices you make for each of the two groups. Explain why you made those choices.
b. From the chart above which choices make limited sense – if they make sense at all as we discussed in class.
c. Which key distribution method would you choose for these groups assuming that you have to rotate the keys every 20 days for all the users.
d. Given this packet
i. What does the SPI do?
ii. How did the SPI get assigned? Explain the process
iii. What do you suppose would happen if it were missing?
e. Can we use tunnel mode for the work at home persons inbound circuit – inbound to the home workers? (yes or no)

4. Do the following:

Fill in the comments for this code describing what you think each line is doing: (10 points)
!—

interface Ethernet0/1

!—

ip access-group 101 in

!—

access-list 101 deny icmp any 10.1.1.0 0.0.0.255 echo

!—

access-list 101 permit ip any 10.1.1.0 0.0.0.255

For the following list what do you believe the effect of this list is (be careful this is tricky): (10 points)
interfaceethernet 4 ?ip access-group 199
access-list 199 permit ip any any ?access-list 199 deny ip 106.45.0.0 0.0.255.255 any ?access-list 199 deny tcp any 44.7.12.224 0.0.0.15 eq ftp ?access-list 199 deny udp 23.145.64.0 0.0.0.255 host 1.2.3.4 eq rip

5. If you were planning a network defense, what might you do to control for an attacker actively scanning and mapping your network? (10 points) This needs to be a very detailed answer.
6. Describe how VTP makes VLANs more effective in large campus environments? (10 points)

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂