Security Policy

Part I: 3-4 paragraphsDiscuss 4 software or hardware problems that will render two hosts unable to use the transmission control protocol/Internet protocol(TCP/IP) protocol to communicate.Answer the following question:What are 4 problems that will break TCP/IP communication between two hosts? Briefly explain.The selected problems can pertain to hardware issues, software issues, or a combination of both.What network troubleshooting tools would you recommend for identifying the problems?How would you use them to address the issues listed above?What advantages and disadvantages does each tool present?Part II: 3–4 paragraphsSecurity should be a top concern for every network environment. This is especially true in a converged network. Many mission-criticalservices depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must betaken to reduce the risk of a security breach.Answer the following question:1 way to reduce risk in the network.Who do you think is responsible for keeping the network safeThe administrator, the users, or both? Why?