Network Devices, Security Protocols, and Infrastructure Management: A Comprehensive Overview: Outcome Assessment 2

An assessment covering network security protocols, infrastructure management, and device protection techniques.

Hunter Harris
Contributor
5.0
50
10 months ago
Preview (3 of 9 Pages)
100%
Log in to unlock

Page 1

Network Devices, Security Protocols, and Infrastructure Management: A Comprehensive Overview: Outcome Assessment 2 - Page 1 preview image

Loading page ...

Running Head:Outcome Assessment 21Outcome Assessment 2Student8/11/2015Explain the concepts ofnetwork devicesand their roles in a network infrastructure, with aparticular focus onrouters, switches, and firewalls. Additionally, describesecurityprotocolssuch asIPSec,Kerberos, andauthentication protocols(CHAP, PAP, etc.) andtheir importance in maintaining network security.In your answer, compare and contrastVLANsandVPNs, and explain their functions within anetwork. Discuss how technologies likeintrusion detection/prevention systems (IDS/IPS)contribute to safeguarding a network and outline the purpose of aDMZin network security.Provide relevant examples to support your explanation.Word Count Requirement: 800-1000 words.

Page 2

Network Devices, Security Protocols, and Infrastructure Management: A Comprehensive Overview: Outcome Assessment 2 - Page 2 preview image

Loading page ...

Page 3

Network Devices, Security Protocols, and Infrastructure Management: A Comprehensive Overview: Outcome Assessment 2 - Page 3 preview image

Loading page ...

Outcome Assessment 221 (a)Device stores informationregardingthe pathsinformationtakes on asystemarerouter because Routing is themethodofchoosingbestways in a network.Formerly, thewayrouting alsoexpectedforwarding networkinterchangebetweennetworks.Conversely, thatfinalfunction isimprovedexplainedas forwarding.B.Sockets are amixtureof the IP addressas well aswhich of the portsubsequentbecausethemixtureof an IP addressas well asa port number isidentifiedasocket.And alsomainly asocketexclusivelyidentifiesanonlynetworkmethodwithin thecompleteInternet.A littletheways "socket"as well as"port number" areappliedinterchangeably.C.Simplifiedrouting protocolsas well astablesindividualof the mostgeneraldevices on asystemis the switch. And also it followingclassifiesthe mostsignificantprofitsof using a switchfor the reason thatthis istwosections oftoolslook similaras well asperformsa number ofparallelfunctions,other thaneach has itsindividualdistinct function todoon a network.A routerconnectsprocessors to theInternet;consequentlyclients can sharethelink.d.IPSec because theexecutionof IPSEC iscompulsorywith ipv6.Althoughit isbroadlyexecutedwith ipv4,and alsoit is notanobligationE.MAC thesubsequentaccess controlwaymodelspermits theproprietorof aresource togivepermissions to thatsourcefor the reason thatMandatory Access Control,representationgives only theproprietorandkeepersupervisionof the access controls.Andalso this denotes the endclienthas no controlin excess ofsomesettings thatgivesomeprivileges tosomeone.
Preview Mode

This document has 9 pages. Sign in to access the full document!