Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
questiona your office administrator is being trained to take server backups which authorization model could be ideal for this situation mac dac or
questiona which type of attacker represents the most likely and most damaging risk to your networkb what is the basic reason that social engineering
caralouer provides rental of cars to its customer on a regional basis ie a car is attached to a regional home-base which also houses a regional
questiona explain briefly three typical network topologies giving one advantage and one disadvantage of each topology explain the three topologies
question 1 describe the followinga internet technologiesb networksc media access controlquestion 2 explain the various classes of networksquestion 3
a consider that a host is sending a frame of 1200 bytes to another host found 20 kilometers away assume that switching delay is negligiblei
questiona in relation to network design give two reasons why the building-block approach is favoured to the traditional approachb explain the
question 1a what is xdsl and enumerate the benefit of such a technologyb name some of the typical applications of xdsl and the different types and
question 1a differentiate between the several types of switching networks together with illustrationb with the help of a diagram explain the two
questiona distinguish between udp and tcpb you have been asked to design and implement a chat application for a university which protocol could you
questiona the ieee 802 series of standards describe both the physical and data link layers of their respective technologies two important standards
questiona describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as tcpb
questiona outline the main interactions that take place when a user requests a valid web resource in the address bar of a modern web client till the
questiona what is network address translation nat why is it usedb given a following information by your isp about your newly acquired frame relay
questiona there are two basic approaches to dealing with errors in the presence of pipelining one way is go-back-n and the other strategy is
a calculate the crc for the frame belowframe 1101011011generator 10011message after appending 4 zero bits 11010110110000b osi refers to a system in
questiona explain what the following intermediate systems are and how they worki repeater ii bridgeb a service is formally specified by a set of
questionhuman telephone conversations are characterized by irregular pauses alternating with irregular bursts of speechin contrast communication via
questiona state briefly three reasons why computer networks are usedb differentiate between simplex half-duplex and full-duplex mode of transmissionc
questiona explain the following terms information communication technology operating system and application softwareb define what a computer is give
problema what is the minimum length of a password that could be considered to be strong in the context of todays computing powerb the security of a
questiona what do you understand by the term integrityb which type of attack denies authorized users access to network resourcesc you have
questiona how can you prevent someone from accessing your computer when you leave your office for some timeb what is the difference between a
questiona what is the main security vulnerability of ipv4b which protocol can be used for secure remote loginc distinguish between the transport
questiona mention three limitations of a firewallb compare packet-filtering and proxy-base firewalls give advantages and drawbacks of bothc