Networking and Security
1: Explain briefly the six network topologies: P2P, Bus, Ring, Star, Hybrid and Mesh.
Q2: Explain under what circumstances does the IP address of a machine change. If you had planned to track a user based on his/her IP address, what alternative option can you use?
Q3: You are the Chief Information Security Officer of a company. Obviously, you are concerned about security the most. You need to make a choice between (a) hosting an information system on-premise, (b) use infrastructure as a service (Iaas), or (c) use software as a service on the public cloud. Explain what will you choose and why?
Extra Credit: Run the IP Address and Fingerprint sites for multiple browsers on your device. Report your findings.
Last Completed Projects
topic title | academic level | Writer | delivered |
---|