Q​uestion Set 1 – Q​uestion 1.4 After successfully setting u…

Q​uestion Set 1 – Q​uestion 1.4 After successfully setting up NAT, now you have the following IP addresses set up in the system presented in Figure 1.1. I1: IP1 I2: IP2 I3: IP3 I4: IP4 I5: IP5 I6: IP6 Figure 1.1 Network Setup Diagram showing a network configuration with labeled components. From left to right: interface I1, gateway G, Internet cloud, interface I5, and server/router I6.   (Note that IP1-IP6 represents IPv4 IP addresses and Router is not a Gateway, there is no NAT setup on the Router R, NET 4 is still a part of the internet, and IP3, IP4, IP5 and IP6 are all public IPs.) From the client to the server, what are the source and destination IP addresses that complete the table below, when the packet passes through from NET1 to NET4 (NET1 – NET4 are local networks that directly connected to the given networking devices)? Network Source-Destination Mapping NET Source Destination NET1 IP1 NET2 NET3 NET4

Given the following Circle class code, use the provided UML…

Given the following Circle class code, use the provided UML to write the code of the Cylinder class which is a subclass of the Circle class.   ————————————————————————————————————-   UML Cylinder  – height: double + setHeight(h: double): void + getHeight( ) : double + toString( ) : String +Cylinder( ) +Cylinder(c: String, r: double, h: double)  

Q​uestion Set 1 – 1.15 Suppose you want to set up a Network…

Q​uestion Set 1 – 1.15 Suppose you want to set up a Network Intrusion Detection System (NIDS) on the DMZ network using snort. Also, assume that the DMZ network is running on a smart switch and no promiscuous mode is allowed.  In this situation, which of the following statements are correct?(select all that apply)   Figure 1.3 System with DMZ Network diagram for a system with DMZ including two servers connected to an interior router, a webserver in the DMZ between two routers, and a public-facing server connected to the external router. A monitor is also present in the diagram.

Q​uestion Set 1 – 1.14 Supposing you want to incorporate you…

Q​uestion Set 1 – 1.14 Supposing you want to incorporate your branch office’s web service running on web2 as part of your web services that are protected by your DMZ security monitoring and checking modules, you may want to set up a VPN.  In this situation, which of the following statements are correct? (select all that apply)   Figure 1.3 System with DMZ Network diagram for a system with DMZ including two servers connected to an interior router, a webserver in the DMZ between two routers, and a public-facing server connected to the external router. A monitor is also present in the diagram.

Q​uestion Set 2 – Question 2.13 To better implement security…

Q​uestion Set 2 – Question 2.13 To better implement security services, you want to implement a service function chaining approach to manage your security services systematically. The basic idea of service function chaining is presented in Figure 2.5. Figure 2.5 shows two SFCs (blue: SF1=firewall, and red: SF2=IDS) that can be used for two traffic flows for client 1 and client 2, respectively. Which of the following statements best describes your approach? (select all that apply) Figure 2.5. Service Function Chaining   Flowchart of a Service Function Chaining (SFC) network architecture with clients connected to an ingress classifier, passing through firewall and IDS service functions, processed by a service function forwarder, moving through an egress classifier, and terminating at an Apache web server.