Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
q what is peripheral connect interfacepci signify peripheral connect interface its the revolutionary high speed expansion bus presented by intel
q security and reciprocity of rsasecurity and reciprocity of rsa - kp and n are issued publicly- ks is kept secret- since the snooper does not know p
q illustrate about rsa encryptionrsa encryption - public key encryption technique- encryption steps- encode data to be encrypted as a number to
q show the data encryption standarddata encryption standard - bit-level encryption method designed by ibm- adopted as standard for nonmilitary and
q show the character-level encryption- substitutional- monoalphabetic - simplest form also called caesar cipher- every character is replaced with
q categories of encryption - decryption categories of encryptiondecryption - symmetric-key - encryption key ke and the decryption key kd are the same
q describe about cryptography- some media cannot be protected from unauthorized reception or interception- encryption involves transforming the
q show vpns security and the internet model- vpns security and the internet model- application layer - provide for each application protocol other
q what are the trends in network security trends in network security improved vigilance for virus infections continual maturation of firewall
q building a defense in networkingwhen building a defense you must use a layered approach that includes securing- the network infrastructure the
q what are the tools sued for cryptography and web securitytools - cryptography vpn- remote accesspgp- emaildedicated circuits-tunnels- ipsectools -
q explain the types of security servicesecurity services fall into one of the subsequent categories- confidentiality confirms that the info in a
q what is aspects of security- security attack any action whichcompromises the security of information owned by an organization- security mechanism a
q what are the local network security issueslocal network security issues password protection- encrypted username amp passwordgroupowner ids- file
q describe network security and internetworking securitynetwork security - layers 5-7- securing the localized private domainnetwork administration
q show the security policy as well integrated security security policy is on paper statement describing what assets are to be protected and why who
q explain the communication channel threats secrecy threat - secrecy is the avoidance of unauthorized information disclosure- privacy is the guard of
q show the vulnerability of the internetmore vulnerable than private networkwide inter-network connectioneasy access by mass public world-widelack of
q show the importance of securitythe internet presents enormous business opportunitiesthe internet is open to public vulnerable to various attacksone
q define the network securitythe internet and web technology presents enormous promise for e-commerceweb now is used to handle important business
q explain file transfer protocol- file transfer protocol ftp is a tcpip client-server application for copying files from one host to another--
q describe mail access protocolsmail access protocols - used by receiver to retrieve mail when desired- post office protocol version 3 pop3 is a
q explain multipurpose internet mail extensions- the multipurpose internet mail extensions is an extension of smtp that allows the transfer of
q illustrate user agent servicesuser agent ua services - provide template for user to compose a message- reads incoming messages- allows a user to
q explain dynamic domain name systemddns - dynamic domain name system automatically updates the dns master file- sent by dhcp to a primary dns server