Question Set 1 – Question 1.12 Now, you become busier and would like to provide stronger security protection on your local office site. You want to upgrade your firewall system from a dual-home server to DMZ. The initial design is presented below in Figure 1.3. Figure 1.3 System with DMZ Network diagram for a system with DMZ including two servers connected to an interior router, a webserver in the DMZ between two routers, and a public-facing server connected to the external router. A monitor is also present in the diagram. In the new system, because the website is accessible from the public domain, ideally the webserver should be allocated on a separate private network guarded by an interior firewall. Thus, you designed a screened network firewall, where the internal network system is separated as a private network containing a host and a DB, the webserver is placed in the perimeter network (DMZ) set between the interior router and exterior router. The IP addresses in your system are set as as shown in the table below (Table 1.2): In this network setup, both DMZ and private networks will set up using private network addresses. Node-to-IP Mapping in Network Setup Node IP Host 192.168.0.10 Interior Router 192.168.0.30 Exterior Router 172.16.0.10 Webserver 172.16.0.20 DB 192.168.0.20 Which of the following suggested setups can maximize the system’s security? (select all that apply)
Question Set 2 – 1.17 Continuing the scenario presented in Q…
Question Set 2 – 1.17 Continuing the scenario presented in Question Set 1, you would now like to migrate your organization’s networking system to a cloud platform. Specifically, you want to use SDN and NFV techniques to build up your network infrastructure. In order to set up a programmable networking environment, you need to understand some foundations of virtual networking solutions. Which of the following statements are not true regarding classifying VPN protocols? (select all that apply) Figure 1.1 Network Setup Diagram showing a network configuration with labeled components. From left to right: interface I1, gateway G, Internet cloud, interface I5, and server/router I6. Figure 1.2. Updated Network Setup Network diagram with a switch divided into VLAN A and VLAN B, connecting to servers and routers, which are linked to the Internet cloud, illustrating the segregation of sales/marketing and back-office networks via VLANs. Figure 1.3 System with DMZ Network diagram for a system with DMZ including two servers connected to an interior router, a webserver in the DMZ between two routers, and a public-facing server connected to the external router. A monitor is also present in the diagram.
Question Set 1 – 1.13 If you also set up NAT on the interior…
Question Set 1 – 1.13 If you also set up NAT on the interior router, the traffic initiated from the host to the web server (202.10.19.132) on the public domain needs to traverse two NAT (double NAT). Assuming that the default firewall policy is DROP, and IPs are shown in the table in Q1.11. Which of the following iptables NAT configurations is correct? (Only consider one way traffic going from the host to internet.) Figure 1.3 System with DMZ Network diagram for a system with DMZ including two servers connected to an interior router, a webserver in the DMZ between two routers, and a public-facing server connected to the external router. A monitor is also present in the diagram. Node-to-IP Mapping in Network Setup Node IP Host 192.168.0.10 Interior Router 192.168.0.30 Exterior Router 172.16.0.10 Webserver 172.16.0.20 DB 192.168.0.20
Question Set 2 – Question 2.4 What are the primary function…
Question Set 2 – Question 2.4 What are the primary functions of Virtual Extensible LAN (VXLAN)? (select all that apply)
Question Set 1 – 1.14 Supposing you want to incorporate you…
Question Set 1 – 1.14 Supposing you want to incorporate your branch office’s web service running on web2 as part of your web services that are protected by your DMZ security monitoring and checking modules, you may want to set up a VPN. In this situation, which of the following statements are correct? (select all that apply) Figure 1.3 System with DMZ Network diagram for a system with DMZ including two servers connected to an interior router, a webserver in the DMZ between two routers, and a public-facing server connected to the external router. A monitor is also present in the diagram.
Question Set 2 – Question 2.2 Which of the following capabi…
Question Set 2 – Question 2.2 Which of the following capabilities are true about using VPN? (select all that apply)
Question Set 1 – Question 1.3 Consider the network set-up…
Question Set 1 – Question 1.3 Consider the network set-up presented in Figure 1.1. Suppose that on the public domain, a webserver is accessible with an IP address 202.10.19.132. To allow the client access to the web server, you will need to set up NAT on the gateway G. Which of the following options correctly describes the NAT? Figure 1.1 Network Setup Diagram showing a network configuration with labeled components. From left to right: interface I1, gateway G, Internet cloud, interface I5, and server/router I6.
WHAT YOU NAME?
WHAT YOU NAME?
Bohemian Company has 500,000 shares of no par common stock w…
Bohemian Company has 500,000 shares of no par common stock with a stated value of $8 per share issued and outstanding as of January 1, originally issued for $14 per share. During the current year, Bohemian Company had the following transactions involving its own stock: On March 6, acquired shares of treasury stock at a cost of $ per share On April 18, resold shares of treasury stock at $ per share. On June 11, resold an additional shares of treasury stock at $ per shareIf Bohemian uses the cost method of accounting for treasury stock, what will be the balance in additional paid in capital from treasury stock as a result of these transactions?
Dagmara et moi / manger / au restaurant
Dagmara et moi / manger / au restaurant