Anda di halaman 1dari 1

Review Questions ch7

1. Compare and contrast distance-vector and link-state routing. If you were designing a

new routing protocol, which would you use and why?

2. Analyze the routing table on your computer. In Windows you can view it with a

route print command. On a Mac, you can view it with a netstat -rn command. What

entries are in your routing table and why are they there? Is your default route in the

table and, if yes, what is it?

3. Select a routing protocol that interests you, whether its RIPv2, OSPF, EIGRP, BGP,

or a different routing protocol. Research any security issues associated with this

routing protocol and write two or three paragraphs about what you discovered.

4. Network designers use many factors when deciding which routing protocol to use.

For example, they consider whether the routing protocol converges quickly. List and

briefly describe five other factors that characterize routing protocols and help a designer

distinguish one protocol from another.

Review Questions ch8

1. What is the difference between a security plan and a security policy? How do these two relate to each
other?

2. People who are new to security often assume that security simply means encryption. Why is this a
naive assumption? What are some other aspects of security that are just as important as encryption?

3. List and briefly describe four tradeoffs that often must be made in order to achieve good network
security.

4. Research a case that has been in the news in the last few years where a major security breach
occurred on a wireless network. Find a case where attackers got in via the wireless network but then
penetrated farther into the network, resulting in severe economic or political damage to the victim
organization. Write two or three paragraphs about what you found.

Anda mungkin juga menyukai