Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1-list three advantages and three disadvantages of default deny model in IT secu

ID: 3684062 • Letter: 1

Question

1-list three advantages and three disadvantages of default deny model in IT security?

2-list three advantages and three disadvantages of default allow model in IT security?

3-what is Data Replication and where replicated data should be stored?

4-what is backup and where backup data should be stored?

5-Describe the function of sets use source IP addresses, destination addresses, ports, and protocols?

6-What is the purpose of the following rule? Allow Src=10.1.23.54 dest=85.75.32.200 Proto=tcp 21

7-What is the purpose of the following rule? Deny Src=ANY dest=ANY Proto=tcp 23

8-why clear desk policy is important to protect confidentiality of company owned data?

9-why clear screen policy is important to protect confidentiality of company owned data?

NOTE: please no plagiarism

Explanation / Answer

Q. Define Data Replication?
_________________________________
A.   Data Replication is the frequent electronic copying data from a database in one computer or server to a database in another so that all users share the same level of informtion.
Replicated data is executed and stored in separate devices, or it could be replicated in space,i.e executed on repeatedly on single device.Replication in space or in time is often linked to scheduling alogorithms.
Q. Define backup?
__________________
A.   Backup and recovery refers to the process of backing up data in case of a loss and setting up systems thst allow that data recovery due to data loss.
Backup memory is stored in some data storage devices that are useful for making backups.
Q. Function of IP address?
_____________________________
A.   An IP address serves two principal functions: host or network interface identification and location addressing.
Q. Function of Ports?
_________________________
A   Computer ports have many uses,to connect a monitor,webcam,speakers, or other peripheral devices. On the physical layer, a computer port is a specialized outlet on a piece of equipment to which a plug or cable connects.
Q.Function of Protocols?
_____________________________
A.    The function of protocol is to enable the exchange of information between computers or network devices using standards/rules. In other words,they use a certain format that both can understand so information can be exchanged.