Explain the general intent of a trojan horse

Assignment Help Computer Network Security
Reference no: EM13869549

1. At which layer of the OSI model does the protocol UDP operates?

2. At which layer of the OSI model does the protocol ICMP operates?

3. Identify the port number and service provided by the following ports:

• HTTP

• DNS

• FTP

• SMTP

• SNMP

4. What class IP address is 192.168.1.1?

5. What class IP address is 127.0.0.0?

6. What is the delivery unit for the transport layer?

7. What is the delivery unit for the data link layer?

8. What is a type of malicious malware that is self-replicating and does not need system or human interaction to spread?

9. Identify a type of social engineering attack.

10. Identify the following IEEE 802 standards for use:
• 802.11
• 802.5

11. At which layer does a switch operate?

12. At which layer does a router operate?

13. Identify a connection-less protocol.

14. Identify a connection oriented protocol.

15. Explain the three way hand shake.

16. By signing a document with your digital signature you are not able to refute that you sent it. This is an example of what

17. MD5 hashes ensure that a file has not been altered in transmission. This is an example of

18. Explain the general intent of a Trojan horse.

19. If network redundancy is a requirement which network topology is the best solution?

20. What layer of the OSI model is responsible for error detection, flow control and recovery?

21. T or F - IPSec encompasses the technology of AH and ESP?

22. T or F - SSL is used for SHTTP

23. Identify the following port:
• 443
• 110
• 25

24. Using the OSI model, in which direction is data distributed from the sender?

25. Using the OSI model, in which direction is data received by the recipient?

Reference no: EM13869549

Questions Cloud

What is difference between instruction and pseudoinstruction : What is the difference between an instruction and a pseudoinstruction? What is the difference between the instruction location counter and the program counter, if any?
Show steps needed to look up ann arbor using binary search : Show steps needed to look up Ann Arbor using binary search on the following list: Ann Arbor, Berkeley, Cambridge, Eugene, Madison, New Haven, Pasadena, Santa Cruz, Stony Brook, Westwood, and Yellow Springs.
What does this behavior suggest about omole ethics : Omole displayed contempt for the court and ridiculed his victims, calling them stupid for having been cheated. What does this behavior suggest about Omole's ethics
Seles company adopts a performance based share option : On January 1, 2010, Seles Company adopts a performance based share option plan for its 80 key executives.
Explain the general intent of a trojan horse : Explain the general intent of a Trojan horse.
Theoretical maximum and minimum values : Sketch the following waveforms, and include the theoretical maximum and minimum values of each waveform:
Describe the steps that would use in order to convert data : Describe the steps that you would use in order to convert database tables to the First Normal Form
Is it possible to use binary search on a table : Is it possible to use binary search on a table whose size is prime? Compute the hash code for each of the following symbols by adding up the letters (A = 1, B = 2, etc.).
How many probes will be needed on average to enter a symbol : If that one is also full, another is used, and so on, until an empty is found. If the fraction of the slots that are full is R, how many probes will be needed, on the average, to enter a new symbol?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd