Explain the important characteristics of a dmz, Software Engineering

Assignment Help:

Question:

a) A firewall will be classified according to which layer of the OSI model the protection is at. Using this classification, explain the different types of firewalls.

b) Why is a demilitarized zone (DMZ) used in a firewall configuration? Explain the most important characteristics of a DMZ.

c) Explain five different types of computer viruses. Show the most dangerous type and justify your choice.

d) Briefly explain the essential features Microsoft ISA Server. How does it works and how is it configured.

e) Describe why WEP is no longer secure for wireless networks nowadays. Give two techniques that will be used to overcome this problem.

f) Explian the following form of attacks and rate them in order of lowest to highest advantage gained by a cryptanalyst:

i. Known plaintext
ii. Chosen ciphertext
iii. Chosen plaintext


Related Discussions:- Explain the important characteristics of a dmz

Realistic approach to the development of large-scale systems, Q. Realistic ...

Q. Realistic approach to the development of large-scale systems? There are a number of advantages of Spiral model that makes it a realistic approach to development of large-sca

What is bottom-up strategy, Bottom-up approach, as the name suggests, is th...

Bottom-up approach, as the name suggests, is the differing of the Top-down method. This process begins with building and testing the low level modules first, working its way up

What is continuous cmmi model, What is continuous CMMI MODEL? This is a...

What is continuous CMMI MODEL? This is a finer-grain model that considers individual or groups of practices and assesses their use. The maturity assessment is not a one valu

Hatley pirbhai, what is hatley pirbhai extension and what is its use

what is hatley pirbhai extension and what is its use

What are the reasons behind to perform white box testing, What are the reas...

What are the reasons behind to perform white box testing? There are three main reasons behind performing the white box testing.  1. Programmers may have some incorrect assum

Explain cocomo model with its applicable equations, Q. Explain COCOMO model...

Q. Explain COCOMO model with its applicable equations. Describe various attributes of cost drivers used in COCOMO model. Ans. COCOMO denotes for constructive cost model -

What are the challenges in software, What are the challenges in software?  ...

What are the challenges in software?  Copying with legacy systems. Heterogeneity challenge  Delivery times challenge

What is cardinality in data modelling, What is cardinality in data modellin...

What is cardinality in data modelling? Cardinality in data modeling, cardinality verifies how the number of occurrences of one object is related to the number of occurrences of

Explain fan in, FAN IN is simply a count of the number of other Components...

FAN IN is simply a count of the number of other Components that can call, or pass control, to Component A.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd