The following Each Question Discuss with APA format, No plaigiarism and References
1.a)Why do you think the TCP/IP (Internet) model is more widely used than the OSI model?
b)What are the differences between risks, threats, and vulnerabilities? How do these concepts relate to each other?
2. a) What are the differences between password-based authentication and role-based authentication? What are their advantages and disadvantages?
b)From a security standpoint, why is it important to block ping requests at your network firewall?
3. a) What are the differences between Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP)? Please specify some examples where one protocol is more appropriate than the other.
b)What are the differences between a VPN mesh topology and a VPN star topology? How would you compare VPN topologies to network topologies?
4.a)What are the differences between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)? Can they both work together to protect the same network?
b)What are the advantages and disadvantages of hiring a company that provides incident response services? If you decide to hire, do you still need to create a SIRT in your organization?