Write one page for each question and provide two sources each. 1. Submit a repor

by | Sep 18, 2022 | Computer Science | 0 comments

Write one page for each question and provide two sources each.
1. Submit a report in which you discuss the purpose of the VLAN Trunking Protocol (VTP) and the modes in which it operates.
2. The first step in conducting an audit is to create a master list of the assets your company has, in order to later decide upon what needs to be protected through the audit. While it is easy to list your tangible assets, things like computers, servers, and files, it becomes more difficult to list intangible assets. To ensure consistency in deciding which intangible company assets are included, it is helpful to draw a “security perimeter” for your audit. Briefly define the term “security perimeter” and provide a list of assets you think would fall under your university’s security perimeter.
3. Create a Subnetting Table. Use the following headings for the information that needs to be included:
· # of bits (number of bits),
· Subnet mask,
· # of subnets (number of subnets), and
· the maximum number of hosts for Class A, B, and C networks.

Do you need any assistance with this question?
Send us your paper details now
We'll find the best professional writer for you!