What is vulnerability

Assignment Help Basic Computer Science
Reference no: EM133985365

Questions

1. In OSI model, Data Link Layer (layer 2) uses frames. What is frame? What is the address used in frame called (in Ethernet network)?

2. In TCP/IP or OSI model, which layer handles reliable delivery and flow control?

3. What are the PDUs (protocol data unit) at the following 2 layers of OSI model: Transport, Network?

4. TCP three-way hand shake uses a few segments, what are these?

5. What is the Internet DMZ?

6. What is vulnerability?

7. CWE (Common Weakness Enumeration) is a community-developed list of weakness types on software and hardware. Based on 2020 CWE Top 25 most dangerous software weakness list on https://cwe.mitre.org/data/definitions/1350.html, pick one from the top 25 most dangerous weakness and give a concrete example of the vulnerability and how to exploit it.

8. CVSS (Common Vulnerability Scoring System) basically tries to produce a numerical score for a vulnerability. For the vulnerability CVE-2020-17519, what is CVSS 3.0 score and 2.0 scores? What is the description of the vulnerability?

9. CVE (Common Vulnerabilities and Exposures) list each identified vulnerabilities and give it a unique identification. Find a vulnerability identified on Jan. 12, 2021 and list its CVE number, description and CVSS score from National Vulnerability Database:

10. What is an ethical hacker?

Reference no: EM133985365

Questions Cloud

Describe generic models of application systems : Describe the differences between applying each model, using real-life example. Describe generic models of application systems to include transaction processing
Microsoft azure and aws : Briefly outline the difference between the four main services that Microsoft Azure and AWS provide as major Cloud Service Providers.
What will be the mean time to fail : What will be the Mean Time To Fail (MTTF). What will be the Failures In Time ( FIT)? What will be the Reliability of the system?
Differences between layered security and defense in depth : Discuss the similarities and differences between layered security and defense in depth.
What is vulnerability : In OSI model, Data Link Layer (layer 2) uses frames. What is frame? What is the Internet DMZ? What is vulnerability?
Operational logic and theory of hash functions : Outline the operational logic and theory of Hash Functions to include the aspects of their role in digital encryption methods
Individual freedom versus security and law enforcement : Discuss the debate between privacy/individual freedom versus security and law enforcement in regards to managing public key and encryption techniques.
Install an enterprise-grade wireless network : As part of your job, you've been given a project to install an enterprise-grade wireless network.
Credential management and privileged access management : Explain what enterprise credential management and privileged access management are, and provide at least one example of each.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd