Explain the general intent of a trojan horse

Assignment Help Computer Network Security
Reference no: EM13869549

1. At which layer of the OSI model does the protocol UDP operates?

2. At which layer of the OSI model does the protocol ICMP operates?

3. Identify the port number and service provided by the following ports:

• HTTP

• DNS

• FTP

• SMTP

• SNMP

4. What class IP address is 192.168.1.1?

5. What class IP address is 127.0.0.0?

6. What is the delivery unit for the transport layer?

7. What is the delivery unit for the data link layer?

8. What is a type of malicious malware that is self-replicating and does not need system or human interaction to spread?

9. Identify a type of social engineering attack.

10. Identify the following IEEE 802 standards for use:
• 802.11
• 802.5

11. At which layer does a switch operate?

12. At which layer does a router operate?

13. Identify a connection-less protocol.

14. Identify a connection oriented protocol.

15. Explain the three way hand shake.

16. By signing a document with your digital signature you are not able to refute that you sent it. This is an example of what

17. MD5 hashes ensure that a file has not been altered in transmission. This is an example of

18. Explain the general intent of a Trojan horse.

19. If network redundancy is a requirement which network topology is the best solution?

20. What layer of the OSI model is responsible for error detection, flow control and recovery?

21. T or F - IPSec encompasses the technology of AH and ESP?

22. T or F - SSL is used for SHTTP

23. Identify the following port:
• 443
• 110
• 25

24. Using the OSI model, in which direction is data distributed from the sender?

25. Using the OSI model, in which direction is data received by the recipient?

Reference no: EM13869549

Questions Cloud

What is difference between instruction and pseudoinstruction : What is the difference between an instruction and a pseudoinstruction? What is the difference between the instruction location counter and the program counter, if any?
Show steps needed to look up ann arbor using binary search : Show steps needed to look up Ann Arbor using binary search on the following list: Ann Arbor, Berkeley, Cambridge, Eugene, Madison, New Haven, Pasadena, Santa Cruz, Stony Brook, Westwood, and Yellow Springs.
What does this behavior suggest about omole ethics : Omole displayed contempt for the court and ridiculed his victims, calling them stupid for having been cheated. What does this behavior suggest about Omole's ethics
Seles company adopts a performance based share option : On January 1, 2010, Seles Company adopts a performance based share option plan for its 80 key executives.
Explain the general intent of a trojan horse : Explain the general intent of a Trojan horse.
Theoretical maximum and minimum values : Sketch the following waveforms, and include the theoretical maximum and minimum values of each waveform:
Describe the steps that would use in order to convert data : Describe the steps that you would use in order to convert database tables to the First Normal Form
Is it possible to use binary search on a table : Is it possible to use binary search on a table whose size is prime? Compute the hash code for each of the following symbols by adding up the letters (A = 1, B = 2, etc.).
How many probes will be needed on average to enter a symbol : If that one is also full, another is used, and so on, until an empty is found. If the fraction of the slots that are full is R, how many probes will be needed, on the average, to enter a new symbol?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  How a company-wide policy program could help the situation

Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

  Is data hiding a valuable security consideration

Explain the term data hiding, which is used in object-oriented programming. Is data hiding a valuable security consideration. Why or why not

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

  Which type of computer crime describes actions

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

  Discuss physical and logical vulnerabilities

A first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This list should be fairly exhaustive. Many vulnerability and threat pairs will not make the final cut for..

  Discuss ways to reduce risk in the network

Discuss 2 ways to reduce risk in the network. Who do you think is responsible for keeping the network safe to the administrator, the users, or both? Why

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Problem related to internet communication

Question 1: What is Net Neutrality and why is it important? Question 2: From the group project, identify at least one important step needed to work successfully with a team when working virtually (collaborating online rather than face to face). Th..

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  Discuss the type of encryption

Identify the key reasons for selecting your wireless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd