Close

OCU ISCAP A Week 03 Lesson 09 Discussion

Viewing 1 reply thread
  • Author
    Posts
    • #91485
      Manny Varela
      Keymaster

      In reviewing the challenges of different topologies, choose two types of topologies and discuss how a security officer could work with these challenges so that they minimally affect the company.

    • #92026
      Aaron Elliott
      Participant

      Ring topology has all users connected to one another in a ring style connection. The issue with ring topology is if one node is defective then the whole topology is unable to send data past the defective node, as a signal ring set up sends data in one direction. A work around for this issue would be a dual ring topology. The second ring would provide redundancy and availability, so when one ring fails the other nodes can still receive data via the additional ring.

      Partial mesh topology allows for failure in an area of the network and allows for communication between the remaining network, but any other device in the failed sector will not be able to communicate. The better option would be to go full mech so that every device is connected in the network, allowing for fault tolerancing when one device goes down, no other device is affected.

Viewing 1 reply thread
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!