Problem 1: Evaluate the three checklist files provided for the firewall, router, and switch STIGs.
Problem 2: In the virtual desktop, use the STIG viewer to evaluate the three checklist files provided for the firewall, router, and switch STIGs.
Then, in one-two pages (including a cover sheet), address the following:
- Make a table showing the vulnerabilities associated with each asset.
- Evaluate which assets should be prioritized for mitigation or remediation.
- Explain your rationale.