Cloud computing uses virtualization. Explain how hypervisor works and how virtualization -aware security tools can protect virtual machines.
Give an example of when this tool might be used (300 words)list the five types of firewalls and how they filter traffic.
Briefly describe a work scenario and which firewall would be the best fit for that scenario. explain your reasoning in 300 words or more.
Briefly define defense in depth and how it works in network defense. why would you implement this process? 300 words or more.