1. Compare and contrast distance-vector and link-state routing. If you were designing a
2. Analyze the routing table on your computer. In Windows you can view it with a
route print command. On a Mac, you can view it with a netstat -rn command. What
entries are in your routing table and why are they there? Is your default route in the
3. Select a routing protocol that interests you, whether its RIPv2, OSPF, EIGRP, BGP,
or a different routing protocol. Research any security issues associated with this
routing protocol and write two or three paragraphs about what you discovered.
4. Network designers use many factors when deciding which routing protocol to use.
For example, they consider whether the routing protocol converges quickly. List and
briefly describe five other factors that characterize routing protocols and help a designer
1. What is the difference between a security plan and a security policy? How do these two relate to each
other?
2. People who are new to security often assume that security simply means encryption. Why is this a
naive assumption? What are some other aspects of security that are just as important as encryption?
3. List and briefly describe four tradeoffs that often must be made in order to achieve good network
security.
4. Research a case that has been in the news in the last few years where a major security breach
occurred on a wireless network. Find a case where attackers got in via the wireless network but then
penetrated farther into the network, resulting in severe economic or political damage to the victim
organization. Write two or three paragraphs about what you found.