What type of malware caused danny the problem

Assignment Help Computer Network Security
Reference no: EM131228152

1 - Assignment Question:

People often misuse ICT terminology.  Imagine you receive the following email:

Dear Helpdesk

My hard drive took ages to boot-up this morning and now my Internet has stopped working and I can't print anything.  Help!

Frustrated User.

What terminology mistakes has the user made?  What terminology should they have used?

2 - Assignment Question:

An office LAN has ten workstations.  The office manager has asked you to replace their 100Mbps wired switch with a wireless access point (AP) capable of 300Mbps. Will this increase or decrease the bandwidth available to each workstation? Explain your reasoning by including estimates of effective bandwidth for each case.

3 - Assignment Question:

CSMA/CD on a physical bus and CSMA/CA over Wi-Fi operate in a very similar way and do very similar things. However, how do they operate differently in the case of three devices wanting to transmit simultaneously? 

4 - Assignment Question:

Danny's Dinosaurs is an adventure park celebrating around all things Jurassic. The park consists of a number of buildings spread over sprawling parkland. The new pterodactyl enclosure has been built some 200 meters from the main exhibit building.  You need to connect the IDF in the pterodactyl enclosure to the MDF in the main building. Explain two reasons why UTP would not be an appropriate backbone medium.

5 - Assignment Question:

Complete the following table by nominating the network layer name and the protocol associated with the following tasks:

1. Ensures that the information sent by the web server reaches your browser

2. Routes messages between your PC and the server over the Internet

3. Allows the web browser software and the web server software to understand the messages sent between them

4. Encapsulates data in frames

6 - Assignment Question:

Explain how it is that IPv4 and IPv6 can co-exist on the same networks and describe two technologies that enable this.

7 - Assignment Question:

A switching table below has the following entries:

MAC Address

Port #

00-25-2A-00-00-01

4

00-25-2A-00-10-FC

1

00-25-2A-00-00-2B

2

00-25-2A-00-11-21

3

Port 3 is connected to a hub.

The following events occur:

1. The entry for 00-25-2A-00-10-FC expires.

2. An addition device (00-25-2A-00-10-00) is connected to the hub on port 3. 

3. A new virtualised machine (00-25-2A-00-10-0C) is started on the server connected to port 2

4. Device (00-25-2A-00-10-00) is disconnected from the hub on port 3 and connected to port 5. 

Draw the switching table at the end of this event.  The order of entries is unimportant:

8 - Assignment Question:

Meanwhile, at Danny's Dinosaurs, things are not going very well.  Danny downloaded a game from the Internet, but the game wasn't all it appeared to be. When he ran it, the program actually opened the doors to the velociraptor cage, freeing them into the park full of tourists:  it all became very messy. What type of malware caused Danny the problem?  What are defenses against this type of malware?

9 - Assignment Question:

Danny's Dinosaurs is in crisis.  The recent escape of the velociraptors had a negative impact on the business - moreover they ate all the IT staff.  Danny can't afford to replace the IT staff, so he is considering cloud computing solutions.  Contrast SaaS and IaaS and explain which one is more suitable for Danny's situation.

10 - Assignment Question:

Organisations have a number of options when it comes to centralised storage.  If an organisation needs to have high speed access to sensitive data, contrast two solutions that address these needs.

Reference no: EM131228152

Questions Cloud

Which particle has the greatest mass : Which particle will, when given off, cause the atomic number of the decaying nucleus to increase by one - Which element has no stable isotopes, only having radioactive ones?
Characteristics relative to net worth and risk tolerance : As part of your example, be sure to explain specific characteristics relative to net worth and risk tolerance of the client that you look at when making this decision.
What is the bond current market price : A bond has a face value of $1,000 and a contractual interest rate of 6%. The bond has semiannual interest payments. The market interest rate is 4%. The bond matures in 5 years and will pay $1,000. What is the bond's current market price?
What is the bond current market price : A bond has a face value of $1,000 and a contractual interest rate of 6%. The bond has semiannual interest payments. The market interest rate is 4%. The bond matures in 5 years and will pay $1,000. What is the bond's current market price?
What type of malware caused danny the problem : Meanwhile, at Danny's Dinosaurs, things are not going very well.  Danny downloaded a game from the Internet, but the game wasn't all it appeared to be. When he ran it, the program actually opened the doors to the velociraptor cage, freeing them in..
Considerable experience in product development of handbags : Felicia & Fred recently hired a new designer who has considerable experience in product development of handbags and small leather goods. The intent was for the designer to initially work with the company's innovation team to introduce a gift with ..
Find the transition points for the p channel : Find the transition points for the p-channel and nchannel transistors.- Sketch the voltage transfer characteristics, including the appropriate voltage values at the transition points.
Estimate the portfolio first-percentile var : Suppose you've estimated that the fifth-percentile value at risk of a portfolio is -30%. Now you wish to estimate the portfolio's first-percentile VaR (the value below which lie 1% of the returns). Will the 1% VaR be greater or less than -30%?
In your opinion why do people think the insurance industry : In your opinion why do people think the insurance industry will be disrupted? Do you agree with them? Please support your explanation with examples.

Reviews

len1228152

10/1/2016 7:51:34 AM

While it should not be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!

Write a Review

Computer Network Security Questions & Answers

  How does a password or authentication relate to cia triad

In these weeks readings, we learned about the CIA Triad and how each exhibits dependance on the other. Give examples of how failure of one security property

  Give the sql statement

Give the SQL statement that will find the best selling product(most frequently sold). Output the product name and number sold.

  Advantage of partial order on the empirical relation system

What is the advantage of having a partial order on the empirical relation system and  Why is the number of decisions plus 1 an important method for calculating McCabe's cyclamate number?

  Describe the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote).

  Draft compliance matrix and compliant proposal to rfp

Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.

  Why is the nfs option grayed out on the share protocols page

Why is the NFS option grayed out on the Share Protocols page and According to the Server Manager console, what roles are currently installed on the computer

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

  What is the plain text m

We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS - Will Bob detect this

  If you choose to use cookies explain the extent to which

research and answer the following questions is a streamlined user experience worth possible invasions of privacy? how

  Security weaknesses

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses

  Determine the encrypted message-s entropy

If this message is sent unencrypted and successfully received, determine its entropy? If this message is encrypted with DES using random 56-bit key, determine the encrypted message's entropy?

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd