1.
Assuming that we had to place our current Yoga Application into production, with the addition of the firewall we installed, identify THREE (3) significant and distinct areas for which our application and its environment is still vulnerable, and list some possible ways we would need to protect those vulnerabilities? Be sure to be specific, thorough, and use critical thinking. Imagine this is for your boss, and your job depends on it, but keep it limited to just three paragraphs. Each paragraph should clearly list a VULNERABILITY and at least one MITIGATION for each. Expected length: 3 well-formed but concise paragraphs.
2.
Describe (in detail) the process that occurs in our current Yoga Application, from the time a client VM enters something in their browser to the point at which they see data. Be VERY specific in the processes, products, and related files that are involved in the entire transaction. Use specific names of products and files, to identify the key components in this multi-step transaction that results in a populated webpage to the client from a different VM. Full points awarded where you clearly and concisely describe the network communication, software layers in place, and the full roundtrip technical exchange including all components that you built and tested.