Need Help With Answering The Questions On This Network Protocol Analysis (Part01) Document Need help with answering the questions on this Network Protocol

Need Help With Answering The Questions On This Network Protocol Analysis (Part01) Document Need help with answering the questions on this Network Protocol

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Need help with answering the questions on this Network Protocol Analysis (Part01) Document. Answers can be found from given links in file call Open theses links. I am also attaching my friends paper to look at as an example. 

//////////

/////

COP 620

Professor: ////

Due Date: January 18, 2022

Part 1

Answer the following questions:

1. What is the difference between TCP and UDP? Why would you use one over the other?

Ans:

2. What are some advantages of IPv6 over IPv4? Why do you think it is taking so long for IPv6 to be adopted?

Ans:

3. Research the QUIC Protocol. What network layer does QUIC operate at? What use cases does QUIC seek to resolve?

Ans:

4. What is the difference between an open port and a filtered port? List five common ports that may be open on a corporate network. Why is this important to know from cybersecurity aspect?

Ans:

5. How is encapsulation used in network communications?

Ans:

6. Both Ethernet and IP are involved with delivering data. Compare and contrast these protocols; be sure to discuss what OSI layers they operate and describe specific cases for selecting one over the other.

Ans:

7. If you wanted to sniff internet-bound network traffic for multiple subnets on a corporate network, where could you set up a sniffer?

Ans:

Part 2

I’ve attached an incomplete network diagram for your analysis. Based on this diagram, please provide all of the following information:

1. Identify all ports and protocols used for each network service present on this diagram. Present these results as a table.

2. Where could we access traffic for analysis for the RDP server if we suspect a breach of this device? Assume switches support spanning

3. Assuming some users will require access to multiple servers and desktops in the network, describe best practices associated with username and password selection. What are the dangers of using the same user name and password to access the FTP server and to log into your Windows domain account?

4. The email server does not support TLS for PoP3 due to lack of knowledge by the admin. What risks are opened up by this misconfiguration?

5. Create a new network diagram with additional documentation to include:

· IP addresses (make up an address scheme),

· ports in use

· where one could/should insert security devices such as firewalls to limit exposure to threats

Note: There are multiple valid approaches to this deliverable, and you may use Microsoft PowerPoint, Microsoft Word, Microsoft Visio, or Apache OpenOffice to create your network diagram.

Place your order now for a similar assignment and have exceptional work written by one of our experts, guaranteeing you an A result.

Need an Essay Written?

This sample is available to anyone. If you want a unique paper order it from one of our professional writers.

Get help with your academic paper right away

Quality & Timely Delivery

Free Editing & Plagiarism Check

Security, Privacy & Confidentiality