Discussion: Choose one of the real-world exercises at the end of the chapter on pages 218-219 (5-1 through 5-4). Perform the exercise and write your responses to the questions in your primary discussion response.
Response: You should give response to attached document (response to my friend post)which is posted by my friend, You need to go through his post and give response to that post. your response must be professional, courteous, substantive, add to the conversation, a minimum of 100 words, and more than a statement of agreeing or accolades.
Note: In your responses to other students, please do not just write responses which are long strings of describing how good they did with their post. A single sentence thanking them for their information is sufficient. Then focus on driving the conversation forward, similar to what you would do if you were speaking to them in person. You would likely ask questions, relate to something you have seen before, or go in to greater depth on what you found in your own readings. Please focus on topics such as ‘Why’ this information is important for these discussions. Why is having these resources important? Why is it good to know about these vulnerabilities? Why does having this information help IT professionals in security and business continuity?
Final: I need total 2 word documents
1. Discussion Post in 250 words.
2. Response to my friend post in 100 to 150 words.