Use the diagram below to create an extended access list. You are a network engineer of UMASS and you want to create an access list to stop all hackers entering your web server, and data server. However, you want all enterprise users can access from their home to web server, data server. How do you create an access list, when users are using dynamic IP address provided by their Internet Service Provider? There are different types of Cisco Access Control Lists. Why would you choose one over the other? Explain in detail and provide examples. List and describe two tradeoffs that often must be made in order to achieve good network security. Explain your answer. Why should you have your anti-virus application quarantine infected files instead of deleting them automatically? Provide an example along with your detailed answer. Pick a technology listed below which you have used for a WAN connection. Explain why you selected this technology over others. If you have never configured a WAN, then select a technology from the list below. Describe and explain your reasons for selecting the technology on the basis of reading this week’s course material. ISDN SONET Frame Relay ATM Metro Ethernet There are three virtual circuit design strategies for a frame relay cloud. Explain what these are and the advantages and disadvantages associated with them.