Discuss the most well-known and spectacular DoS attacks in the last few years
Make a list of activities that you do every day in which computer network are used.how would your life be altered if these networks were suddenly switched off?
what are the different topologies which are used for computer networks? discuss in detail
How does TCP’ 3-way handshake mechanism address the following problems?
(a) Delayed arrival of SYN Packet
(b) Delayed arrival of ACK Packet
Describe the two fundamental problems related to a wireless network. How does the MACAW protocol address the problems? Explain
Assume that nodes A and B use a sliding window protocol with 3-bits allocated for frame sequence numbering. Go-back-N protocol is used with a maximum transmission window size of 8 frames. A sends frames to B and it so happens that in one instance, A sends B a full window of frames numbered 0-7. B sends back an acknowledgement frame of RR0. Which frame does A send to B then?
What is the output of first round of DES algorithm when plain text and key both are all ones
You are a system administrator with broad access to enterprise systems. Your
supervisor has asked you to begin archiving all of the emails and web activity
logs of one of your co-workers. Typically requests of this nature are initiated
through a formal communication from your campus’s legal office. You feel that
this request is inappropriate and possibly at odds with standard campus
procedure and processes.
What would you do? In your answer, refer to ethical codes and what IT
professionals need to commit to and mention a few general or common principles included in ethical codes.
FIVE (5) improvements Mr Fakir can implement for the store in
terms of business and management context. Support your proposal with justification as why it
will benefit Mr Fakir’s store.
1.Discuss three security control measures that a company can use to prevent/minimize data loss and hacker activities.
2.Discuss two primary goals that an organization should set in order to secure its information resources like hardware, data, software, and computer network.