What are some of the security-related decisions you will need to make to deploy IPv6?
What will be an ideal response?
Security-related decisions you will need to make to deploy IPv6:
* Securing network protocols -Most of the routing protocols and protocols used for things such as Neighbor Discovery and Internet Control Message Protocol (ICMP) have options to use relatively robust authentication mechanisms. The advantage to using them is that it requires more skill on behalf of malicious users, therefore malicious activity will be less successful. The disadvantage is that security often complicates things, requiring more skill to configure and troubleshoot problems. Project changes will also be less successful.
Encrypting everything-The idea that all traffic on a network can be encrypted is interesting but not without a few drawbacks. Namely, encryption remains CPU intensive unless it is offloaded to hardware accelerators, and encryption reduces the usability or effectiveness of many tools, such as sniffers.
No perimeter-Your devices have a globally unique address. If your important traffic is encrypted from host to host, do you need a firewall to block the Internet and create a perimeter? It's hard to argue the pro-perimeter case if your organization allows people to use their laptops to work from home or the local coffee shop. One could make the case that the perimeter instead belongs in front of the data center.
You might also like to view...
Answer the following statement(s) true (T) or false (F)
1. Program scope tags are available to all programs in a project. 2. A task that is executing can be interrupted by another higher priority task. 3. Programs execute in the order in which they are displayed in the controller organizer under their task. 4. : A project is the overall complete application. 5. A project is the file that stores the logic, configuration, data, and documentation for a controller. 6. An application can be broken into multiple logical tasks.
To ____ a site is to specify the site's local site root folder location to Dreamweaver.
A. link B. define C. upload D. download
A(n) ________ is an individual who designs documents with interactive content such as content controls and macros
A) technical support manager B) systems analyst C) developer D) end user
To create a split form, select the table in the Navigation Pane, click Create on the Ribbon, and then click the ____ button on the Create tab to display a menu and click Split Form on the menu.
A. All Forms B. More Forms C. Tabular Forms D. Forms View