read the prompt below and answer the following questions

In Module Five, you were introduced to the Routing Information Protocol (RIP). You used RIP to allow networks to communicate through a router.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

RIP is one of the interior routing protocols that can be used to open communications between networks, or it can be used to stop communication between devices that reside on the same or different networks. As with any routing protocol, RIP has benefits and drawbacks. As a security practitioner, you will be called upon to provide your unique viewpoint and expertise in weighing the factors related to connectivity, traffic flow, and security when selecting or implementing routing protocols.

Questions:

For your initial post, address the following:

How does employing an adversarial mindset affect decisions to implement RIP in the network? Construct your answer using one of the six fundamental design principles identified below:Separation of domainsIsolationModularityLayeringLeast privilegeMinimization of implementation Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad and Fundamental Security Design Principles PDF document.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed with your coursework?
Get quality coursework help from an expert!