This is part #2 of exam #2.
This exam is an open book/note/slide deck exam only.
Students are prohibited from using any other resource to assist with taking this exam. Prohibited resources include, but are not limited to, search engines such as Google.
This exam is a singular effort, and students are prohibited from taking this exam in a group setting.
This exam has two parts. This part is comprised entirely of short answer/discussion questions.
The point totals from both parts will be combined to get your raw score, which will then be converted to a 100-point scale.
You must write all answers in your own words. Copying and pasting answers directly from the textbook or slide deck will result in a zero for that question. Merely changing a word here or there is not acceptable either. Use the open “TurnItIn” assignment box in D2L to help you avoid a zero here and be smart. If TurnItIn flags your content in segments of more than 2-3 words (excluding common words/terms), you should rewrite it to remove the flag. If I see too much-flagged content from TurnItIn on your answer, I will give you a zero for the answer, and it will be your responsibility to explain why I should change the grade.
Follow the directions in my syllabus regarding Grammarly usage and submit your Grammarly report along with your exam answers. Failure to follow these directions will result in a penalty as described in the course syllabus.
Put your answers in this document and submit it via D2L by the posted exam deadline.
Changing or modifying this document outside of adding your answer will result in a grade of zero for this assignment. Do not delete/change/modify this document template, and do not delete page breaks between questions. Just add your responses to it after each question!
Question #1 (10 points)
List and briefly discuss the steps in firewall rule change management, as discussed in the course reading assignments.
Question #2 (10 points)
List and discuss the three core components of Zero Trust as discussed in the course reading assignments.
Question #3 (10 points)
List and briefly discuss the three essential activities that protect data transmitted over a VPN, as discussed in the course reading assignments.
Question #4 (10 points)
List and discuss suggestions offered in the text to help organizations choose an appropriate co-location facility, as discussed in the course reading assignments.
Question #5 (10 points)
List and briefly describe the drawbacks of using a VPN, as discussed in the course reading assignments.
Question #6 (10 points)
List and briefly discuss the key features to look for when tracking attack paths on the network, as discussed in the course reading assignments.
Question #7 (20 points)
List and discuss the seven tenets of Zero Trust as discussed in the course reading assignments.