problem1. A firewall can be categorized according to which layer of the OSI model the protection is at. Using this classification, describe the dissimilar types of firewalls.
problem2. Sketch a possible dual-homed Bastion Host configuration? How is it dissimilar from a single-homed Bastion Host?
problem3. Illustrate five different types of computer viruses. Determine the most dangerous type and justify your choice.
problem4. Briefly illustrate the essential attributes Microsoft ISA Server. How does it work and how is it configured.
problem5. Describe why WEP is no longer secure for wireless networks nowadays. Provide two methods which can be employed to overcome this problem.
problem6. describe the following form of attacks and rate them in order of lowest to highest benefit gained by a cryptanalyst:
i) Chosen ciphertext
ii) Known plaintext
iii) Chosen plaintext