Assignment 2 Questions COIT20262 Assignment 2 Questions Term 2, 2019 Advanced Network Security Page 1 of 10 COIT XXXXXXXXXXAdvanced Network Security, Term 2, 2019 Assignment 2 Questions Due date: 10am...

1 answer below »

View more »
Answered Same DayOct 13, 2021COIT20262Central Queensland University

Answer To: Assignment 2 Questions COIT20262 Assignment 2 Questions Term 2, 2019 Advanced Network Security Page...

Deepti answered on Oct 15 2021
144 Votes
Assignment 2 Submission
COIT20262    Assignment 2 Submission    Term 2, 2019
COIT20262 - Advanced Network Security, Term 1, 2019
Assignment 2 Submission
    Due date:
    10am Monday 14 October 2019
    ASSESSMENT
    Weig
hting:
    45%
    2
    Length:
    N/A
    
Student Name:        enter your name
Student ID:        id    
Campus:        campus
Tutor:            tutor
HTTPS and Certificates
Part (d)
Write your answer here
Part (e)
Write your answer here
Part (f)
Write your answer here
Part (g)
Write your answer here
Part (h)
Write your answer here
Part (i)
Write your answer here
Part (j)
Write your answer here
Part (k)
Write your answer here
Part (l)
Write your answer here
Part (m)
    Information
    Certificate 1
    Certificate 2
    Whose public key is included?
    
    
    What hash algorithm was used in signing?
    
    
    Whose private key was used when creating the certificate?
    
    
Part (n)
Write your answer here
Part (o)
Write your answer here
Firewalls and iptables
Part (a)
Include screenshot here. (Do not submit the file separately)
Part (b)
Include screenshot here. (Do not submit the file separately)
Part (c)
Include screenshot here. (Do not submit the file separately)
Part (d)
Include screenshot here. (Do not submit the file separately)
Part (f)
Write your answer here
Part (g)
Write your answer here
Network Security
Part (a)
The network diagram depicting wired, wireless and virtual private networks all in one, is shown below. It clearly shows the data encrypted over VPN as wel as wifi encryption.
Part (b)
MAC address filtering: It is a security method that allows/disallows a device to remain on a network. Device that are allowed are assigned 48-bit address. MAC filtering helps to prepare separate list of devices which are permitted to access the network and those that are not permitted. These 48-bit addresses are best suitable allow opening a port for those devices (or IPs) that are allowed on the network. The IT employee needs to use the IP addresses through iptables in order to enlist the IPs that will be allowed access to the network. The employee may ALLOW...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30