1.List at least Four types of Third party configuration management tool. Pick one and discuss in detail,...
Question:
1. List at least Four types of Third party configuration management tool. Pick one and discuss in detail, explain why you picked this tool among others?
2. What is the difference between SAN (storage area network) SDN (software-defined networking), and SDS (software-defined storage)?
3. Zero-Trust architecture is increasingly becoming the new normal, especially, in respect to cybersecurity. Conduct research about Google’s Zero-Trust implementation called “BeyondCorp”. Explain what it is, it’s benefits, deployment, etc.
4. In regard to Wi-Fi security technique, one of Wi-fi’s Protected Access (WPA’s)improvements over Wireless Encryption Protocol (WEP) was to use TKIP (Temporal
Key Integrity Program). What is TKIP, what are the features, its security posture, etc. Explain.
5. If you have ever given the opportunity to come out with a new idea, or improve the existing global cyber eco-system, what would you do? It could be from the security, privacy, ethical, or any other area which you deem is worth-introducing/improving?
Organizational Behavior Integrating Individuals Groups And Organizations
ISBN: 9780415804646
4th Edition
Authors: Joseph E. Champoux