Research the quic protocol


Assignment:

Part 1

Answer the following questions:

1. What is the difference between TCP and UDP? Why would you use one over the other?

2. What are some advantages of IPv6 over IPv4? Why do you think it is taking so long for IPv6 to be adopted?

3. Research the QUIC Protocol. What network layer does QUIC operate at? What use cases does QUIC seek to resolve?

4. What is the difference between an open port and a filtered port? List five common ports that may be open on a corporate network. Why is this important to know from cybersecurity aspect?

5. How is encapsulation used in network communications?

6. Both Ethernet and IP are involved with delivering data. Compare and contrast these protocols; be sure to discuss what OSI layers they operate and describe specific cases for selecting one over the other.

7. If you wanted to sniff internet-bound network traffic for multiple subnets on a corporate network, where could you set up a sniffer?

Part 2

I've attached an incomplete network diagram for your analysis. Based on this diagram, please provide all of the following information:

1. Identify all ports and protocols used for each network service present on this diagram. Present these results as a table.

2. Where could we access traffic for analysis for the RDP server if we suspect a breach of this device? Assume switches support spanning.

3. Assuming some users will require access to multiple servers and desktops in the network, describe best practices associated with username and password selection. What are the dangers of using the same user name and password to access the FTP server and to log into your Windows domain account?

4. The email server does not support TLS for PoP3 due to lack of knowledge by the admin. What risks are opened up by this misconfiguration?

5. Create a new network diagram with additional documentation to include:

o IP addresses (make up an address scheme),

o ports in use

o where one could/should insert security devices such as firewalls to limit exposure to threats

Note: There are multiple valid approaches to this deliverable, and you may use Microsoft PowerPoint, Microsoft Word, Microsoft Visio, or Apache OpenOffice to create your network diagram.

Attachment:- Network Diagram.rar

Solution Preview :

Prepared by a verified Expert
Computer Networking: Research the quic protocol
Reference No:- TGS03160260

Now Priced at $55 (50% Discount)

Recommended (98%)

Rated (4.3/5)