Reference no: EM13939575
There are eight network security questions. I have answered the questions however, I am unclear if I am correct. Please review and if I am wrong, please provide the correct answer along with your explanation.
1. Which of the following pieces of information can be found in the IP header?
a. Source address of the IP packet
b. Destination address for the IP packet
c. Sequence number of the IP packet
d. Both (A) and (B) only.
My answer is d.
2. We also don't want our undeliverable packets to hop around forever. What feature/flag limits the life of an IP packet on the network?
a. Time to Live counter
b. Subnet Mask
c. Header Checksum
d. Wackamole field
My answer is a.
3. I bank online. Which of the following are application-level encryption protocols that I would most likely use to securely bank online?
a. SSL and SET
b. Verisign and SHA1
c. READY, SET, and GO
d. PGP, PEM, and SSL
My answer is a.
4. We don't want our packets to get lost in transit. Which OSI layer is responsible for ordered delivery of packets?
a. Network
b. Link
c. Transport
d. Physical
my answer is b but I am not sure
5. When my teleconference data packets reach the destination computer, what information in the packet is used by the destination computer to figure out that the packets belong to the teleconferencing application?
a. Firewall rules
b. Port numbers in the TCP/UDP header
c. Three-way handshake initiated at the start of the communication.
d. IANA subnet class number in the first octet of the IP address
my answer would be c...but this is a far guess for me.
6. I want to request secure web pages using https://. What port will I need to open on my firewall to allow these SSL-encrypted packets to flow?
a. 161
b. 53
c. 6000
d. 443
e. 137
I thought for web pages uses port 80...
7. Based on what we have learned about TCP and UDP packet accounting mechanisms, which transport control protocol would I most likely use for Internet Telephony/Teleconferencing (Voice over IP)?
a. UDP - Because I don't want to retransmit if some of the packets get lost.
b. UDP - Because I want to make sure that no packets get lost.
c. TCP - Because I don't want to retransmit if some of the packets get lost.
d. TCP - Because I want to retransmit lost voice IP packets later on in the conversation.
I am not sure what they are asking
8. What is the standard IANA port number used for requesting web pages?
a. 80
b. 53
c. 21
d. 25
My answer is a.
What are data declaration statements
: I need an example of a flow chart and specification sheet of a C program.
|
Discuss and critically analyse court or tribunal decision
: Outline the Trade Practices Act / Australian Competition and Consumer Act have been breached and explain why they were breached and Discuss and critically ANALYSE the court/tribunal decision and the reason for the decision
|
Explain why mutations of the framework region of an antibody
: Give one reason why this might be important for the efficacy of the antibody response. Explain why mutations of the framework region of an antibody might be more detrimental to the antibody than mutations in CDR's
|
Compare dry heat and moist heat methods of microbial control
: Describe each of the following in terms of its chemical nature, mechanism of action, mode of application, common uses and effectiveness, and advantages and disadvantages: heavy metals, phenolics, halogens
|
Which pieces of information can be found in the ip header
: There are eight network security questions. I have answered the questions however, I am unclear if I am correct. Please review and if I am wrong, please provide the correct answer along with your explanation.
|
Writing a promotional sales letter
: You have decided to write a promotional sales letter to deliver to the homes and apartments in the area. Your letter should be attractive and include details that you think is necessary to boost business and attract more customers.
|
Fixed manufacturing overhead cost
: Using the annual expected sales for these products, determine the weighted-average unit contribution margin for these three products (Round to two decimal places.
|
Business report format with an executive summary
: Adopt a business report format with an executive summary not exceeding 500 words. Executive summary is included in the word count of 2500.
|
Mechanisms recognition of potentially dangerous molecules
: While limiting the expression of MHC class II to so-called "professional" APCs partially ameliorates the problem of self non self recognition among CD4+ T cells, it remains difficult to understand how it is possible that even these cells' class II..
|