What type of malware caused danny the problem

Assignment Help Computer Network Security
Reference no: EM131228152

1 - Assignment Question:

People often misuse ICT terminology.  Imagine you receive the following email:

Dear Helpdesk

My hard drive took ages to boot-up this morning and now my Internet has stopped working and I can't print anything.  Help!

Frustrated User.

What terminology mistakes has the user made?  What terminology should they have used?

2 - Assignment Question:

An office LAN has ten workstations.  The office manager has asked you to replace their 100Mbps wired switch with a wireless access point (AP) capable of 300Mbps. Will this increase or decrease the bandwidth available to each workstation? Explain your reasoning by including estimates of effective bandwidth for each case.

3 - Assignment Question:

CSMA/CD on a physical bus and CSMA/CA over Wi-Fi operate in a very similar way and do very similar things. However, how do they operate differently in the case of three devices wanting to transmit simultaneously? 

4 - Assignment Question:

Danny's Dinosaurs is an adventure park celebrating around all things Jurassic. The park consists of a number of buildings spread over sprawling parkland. The new pterodactyl enclosure has been built some 200 meters from the main exhibit building.  You need to connect the IDF in the pterodactyl enclosure to the MDF in the main building. Explain two reasons why UTP would not be an appropriate backbone medium.

5 - Assignment Question:

Complete the following table by nominating the network layer name and the protocol associated with the following tasks:

1. Ensures that the information sent by the web server reaches your browser

2. Routes messages between your PC and the server over the Internet

3. Allows the web browser software and the web server software to understand the messages sent between them

4. Encapsulates data in frames

6 - Assignment Question:

Explain how it is that IPv4 and IPv6 can co-exist on the same networks and describe two technologies that enable this.

7 - Assignment Question:

A switching table below has the following entries:

MAC Address

Port #

00-25-2A-00-00-01

4

00-25-2A-00-10-FC

1

00-25-2A-00-00-2B

2

00-25-2A-00-11-21

3

Port 3 is connected to a hub.

The following events occur:

1. The entry for 00-25-2A-00-10-FC expires.

2. An addition device (00-25-2A-00-10-00) is connected to the hub on port 3. 

3. A new virtualised machine (00-25-2A-00-10-0C) is started on the server connected to port 2

4. Device (00-25-2A-00-10-00) is disconnected from the hub on port 3 and connected to port 5. 

Draw the switching table at the end of this event.  The order of entries is unimportant:

8 - Assignment Question:

Meanwhile, at Danny's Dinosaurs, things are not going very well.  Danny downloaded a game from the Internet, but the game wasn't all it appeared to be. When he ran it, the program actually opened the doors to the velociraptor cage, freeing them into the park full of tourists:  it all became very messy. What type of malware caused Danny the problem?  What are defenses against this type of malware?

9 - Assignment Question:

Danny's Dinosaurs is in crisis.  The recent escape of the velociraptors had a negative impact on the business - moreover they ate all the IT staff.  Danny can't afford to replace the IT staff, so he is considering cloud computing solutions.  Contrast SaaS and IaaS and explain which one is more suitable for Danny's situation.

10 - Assignment Question:

Organisations have a number of options when it comes to centralised storage.  If an organisation needs to have high speed access to sensitive data, contrast two solutions that address these needs.

Reference no: EM131228152

Questions Cloud

Which particle has the greatest mass : Which particle will, when given off, cause the atomic number of the decaying nucleus to increase by one - Which element has no stable isotopes, only having radioactive ones?
Characteristics relative to net worth and risk tolerance : As part of your example, be sure to explain specific characteristics relative to net worth and risk tolerance of the client that you look at when making this decision.
What is the bond current market price : A bond has a face value of $1,000 and a contractual interest rate of 6%. The bond has semiannual interest payments. The market interest rate is 4%. The bond matures in 5 years and will pay $1,000. What is the bond's current market price?
What is the bond current market price : A bond has a face value of $1,000 and a contractual interest rate of 6%. The bond has semiannual interest payments. The market interest rate is 4%. The bond matures in 5 years and will pay $1,000. What is the bond's current market price?
What type of malware caused danny the problem : Meanwhile, at Danny's Dinosaurs, things are not going very well.  Danny downloaded a game from the Internet, but the game wasn't all it appeared to be. When he ran it, the program actually opened the doors to the velociraptor cage, freeing them in..
Considerable experience in product development of handbags : Felicia & Fred recently hired a new designer who has considerable experience in product development of handbags and small leather goods. The intent was for the designer to initially work with the company's innovation team to introduce a gift with ..
Find the transition points for the p channel : Find the transition points for the p-channel and nchannel transistors.- Sketch the voltage transfer characteristics, including the appropriate voltage values at the transition points.
Estimate the portfolio first-percentile var : Suppose you've estimated that the fifth-percentile value at risk of a portfolio is -30%. Now you wish to estimate the portfolio's first-percentile VaR (the value below which lie 1% of the returns). Will the 1% VaR be greater or less than -30%?
In your opinion why do people think the insurance industry : In your opinion why do people think the insurance industry will be disrupted? Do you agree with them? Please support your explanation with examples.

Reviews

len1228152

10/1/2016 7:51:34 AM

While it should not be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!

Write a Review

Computer Network Security Questions & Answers

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Evaluate software solutions to security problems

Security is a major concern for many mission-critical applications.  The focus of the assignment is specifically on protocols that contain known vulnerabilities.

  Coaxial cable as a transmission medium

The earliest LANs used coaxial cable as a transmission medium. Over time, unshielded twisted pair wiring emerged as a better and faster medium.

  What is the purpose of the work breakdown structure

What is the purpose of the work breakdown structure

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company

  Targeted marketing and mass marketing

Distinguish between targeted marketing and mass marketing and explain what led to the rise of each. Describe the different market-segmenting strategies companies pursue and why.

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

  Single selector signal

The 2 to 1 multiplexer has two inputs (X1 and X2), and a single selector signal (S). All three switches (S1, S2, and S3) are set as toggle switches.

  Analyse potential attacks and give a method of prevention

Write a key exchange protocol for A and B to share a symmetric key. Analyse potential attacks and give a method of prevention and write a key exchange protocol for A and B to share a session key. Must consider mutual authentication, freshness, inte..

  Providing security for the tcp-ip protocol suite

Compare the three security protocols TLS, SSL and IPaec. Include in your analysis the information needed to engage in a discussion on the advantages and disadvantages of each protocol from these particular points of reference

  Overview of network security fundamentals

Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd