Question 1awhat is your knowing for the term cyber weapon

Assignment Help Computer Networking
Reference no: EM13349365

QUESTION 1

(a)What is your knowing for the term "cyber weapon"? Give an example of a cyber weapon.

(b)How was Sony play station network server (online game center) attacked by the Anonymous collective?

(c)What are the two most imperative threat faced by the security industry?

(d)(i) Discriminate the following two biometric techniques.

1. Iris Scan

2. Retina Scan

(ii) Which of the two techniques is most preferred by users? Give good reason for your answer.

(e)Confer the privacy issues related to the use of Biometrics.

QUESTION 2

(a)Put in plain words the concept of Single Sign On (SSO). Mention one benefit and one drawback of SSO.

(b)By means of a figure, tell how Kerberos provides SSO.

QUESTION 3

(a)Briefly explicate how the Security Configuration and Analysis Tool (SCAT) snap-in in MMC (Microsoft Management Console) can be used for securing a computer.

(b)Express the use of each of the subsequent windows command line tool for security purposes:

(i) netstat -an

(ii) arp -a

(iii) ipconfig /displaydns

(c)From a security perspective, what is the use of the MS Config. Means (tools) in windows?

(d)Converse how booting into Safe Mode can help to eradicate malware.

(e)By means of Group Policy, it is possible to arrange security policies in a computer. How can the Group Policy console be accessed from command prompt?

QUESTION 4

(a)Portray the five phases an attacker or ethical hacker undertakes to gain access to a network. Exemplify with a figure.

(b)All through the Foot printing phase, often DNS interrogation allows the attacker to get much information about the network. Why is it so?

(c)Examine two modes to thwart network reconnaissance in a network.

(d) Differentiate or amid b/w human based social engineering and computer based social engineering.

Reference no: EM13349365

Questions Cloud

Question 1abriefly explain how the suspect dobson in utah : question 1abriefly explain how the suspect dobson in utah has been intercepting his ex-employer email.baccording to the
Question 1think about a number of wireless devices nodes : question 1think about a number of wireless devices nodes which are connected to the internet via a single access point
Question 1aregister the owasp top 10 web application : question 1aregister the owasp top 10 web application security risks for 2010.bwhy does software have to be intensively
Question 1give details for the following terms as used in : question 1give details for the following terms as used in cryptographya block cipherb primitive rootc confusiond
Question 1awhat is your knowing for the term cyber weapon : question 1awhat is your knowing for the term cyber weapon? give an example of a cyber weapon.bhow was sony play station
Question 1ai differentiate between denial of service attack : question 1ai differentiate between denial of service attack dos and distributed denial of service ddos attack.ii give
Question 1apresume you want to assess which programmer is : question 1a.presume you want to assess which programmer is the best programmer. you have decided that i will look at
Question jamie wong is considering building an investment : question jamie wong is considering building an investment portfolio containing two stocks l and m. stock l can
Question use the given information to complete phillip and : question use the given information to complete phillip and claire dunphys 2012 federal income tax return. if

Reviews

Write a Review

Computer Networking Questions & Answers

  What is ntp and what are clock strata

Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the  ash drive containing the encrypted le system. Also explain how she would use the lesystem in her day-to-day ..

  Write commands which are required to allow rip version

Write down the commands which are required to allow RIP version 2 and include LAN1 and LAN2 networks also the link between HQ and BRANCH in routing updates?

  Plan for setting up network managment separated by routers

At present WAN has seven networks separated by routers. Networks support 12 servers and 145 clients. Write a brief plan for setting up network managment solution for network.

  Formula for the correction factor for mobile antenna

Explain fully why you chose that solution, why it is of more advantage than the other solutions.  Explain what other specific (how high, how much power, etc.) choices you might suggest to increase system performance as measured by received signal ..

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  List the networking and commination devices required

List the networking and commination devices required, including the IP addresses, product numbers, the cost of each and the approximate total cost.

  Implement cipher-combining ascii representation of plaintext

Particular cipher is implemented by combining ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using XOR function.

  Explaining mutual exclusion protocol

In Lamport'so mutual exclusion protocol, if process i is implementing critical section, Is this still true when there are no messages in transit?

  Explain approach to defeating the tiny fragment attack

Thus, an intermediate fragment may pass through the filter before the initial fragment is rejected. How can this situation be handled?

  Discuss core technology design

You have been hired as a network consultant by an organization called Dwight Motors. Your job is to recommend an elegant solution to support their needs and to address their current problems. The IT manager of Dwight motors wants you to be aware o..

  Explain are lans a stable technology or changing

Are LANs a stable technology or are they changing just as rapidly as other forms of communication technologies? Should software licenses be dropped completely?

  Develop a project plan depicting the project tasks

Develop a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network and develop a network architecture diagram depicting the wireless networking equipment, security devices, and a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd