Physical Security Controls
After reading/viewing this week's materials, please respond to one or more of the following questions.
1. Identify the malicious threat sources to physical security and their corresponding countermeasures
Network Devices, Topologies, and Network Attacks
After reading/viewing this week's materials, please respond to one or more of the following questions.
2. Describe the different Wireless standards within the 802.11 family. What is a rogue access point, and what do we have to worry about?
3. The Transport layer provides two service protocols: UDP and TCP. Explain the differences between the two protocols in terms of guaranteed vs. non-guaranteed service and connection oriented versus connectionless communication.