Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
question 1 discuss the architecture of new generation networksquestion 2 explain the functioning of datagram packet switching and virtual circuit
question 1 explain gsm digital cellular system modelquestion 2 explain cellular digital packet datacdpd system with the help of cdpd network
questiona describe the following biometric techniques- i retina scan ii fingerprint iii iris scan your answer should consider the following the data
question 1 explain fdm and tdm with examplequestion 2 define b-isdn and explain its servicesquestion 3 what is symmetric key cryptography describe
questiona what are the various options to mitigate risks in an information security management system isms for each option specify an instance where
questionai explain what is meant by discretionary access control and mandatory access controlii which method would be the most effective to ensure
questiona explain briefly the pci control objectives which enterprises must meet to be compliant with the payment card industry data security
questiona do you agree with the following statements specify your reasons to support your answer for each-i policies are the foundation for the
question 1a how is the four-way exchange employed for mutual authentication in wparsnb elaborate on how inquiry attacks and traffic monitoring
questiona in a wireless network where wep is enforced as security mechanism what procedure would the network manager adopt for changing wep default
question a what does association refer to in ieee 80211b state the fundamental principles of 3gpp securityc explain the term binding in mobile
questiona distinguish between flow control and congestion controlb explain clearly how a url is resolved by a computerc list one application that
question a several techniques are now available for users to connect to the interneti a modem is commonly used to dial up to the internet why is a
questiona explain how a token ring networks allows sharing of bandwidth access controlb i csmacd is not appropriate for wireless communication
questiona i distinguish between physical topology and logical topologyii explain the following statement with the help of a diagram a star topology
questiona describe fully with example the two access control methods available to implement database securityb discuss why database statistics meta
questiona give 2 benefits of using ipsecb ipsec uses two protocol for security authentication header protocol ah and the encapsulated security
question a there are two approaches for providing confidentiality for packets in a network using symmetric encryption end-to-end encryption and link
questiona what do you meant by the term diffusion and confusion explain how diffusion and confusion can be implementedb distinguish between
questiona distinguish between steganograhy and cryptographyb playfair cipher is more secure than monoalphabetic cipher justify this statementc
question 1 discuss the following switching mechanisms-circuit switchingmessage switchingpacket switching question 2 discuss the following ieee
questiona name a method to allow a person to send a confidential email to another person without risks of a third-party reading the email describe
questiona what do you meant by privacyb name the four privacy violationsc often aggregate information and anonymized information can be combined
questiona describe how ipsec provides data source authenticationb which protocol can be used to provide limited traffic analysis confidentiality
questiona what is the major problem with public key encryption when compared to symmetric key encryptionb consider the following protocol for