” What advantage(s) and disadvantage(s) does port-mapped NAT have when compared with regular NAT or multi-address NAT?
” How does a client that has sent a DHCP request recover when the reply is lost in transit?
” Why are security extensions being developed and applied to the DNS system? Also, what limitations do the current security features have?
” Explain each of the following security concepts
a. Data Integrity
b. Data Availability
c. Confidentiality
d. Authorization
e. Authentication
f. Replay Avoidance
” Why can”t the contents of datagrams traveling across the Internet be trusted?
” Consider figure 30.6 with the following scenario and question. An IP datagram (containing a TCP SYN segment) with source 128.5.255.255:1025 and destination 128.5.1.1:80 arrives on interface 2 of router R. Why would the administrator of this router (which has a firewall built in) want to block this type of traffic and what rule could be added to the table in figure 30.6 to do this effectively?
” What problem were stateful firewalls developed to solve?