answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

How do you begin to become a network engineer?

Network engineers are the backbone of the computer infrastructure of a company. Large companies are able to employ many network engineers, while smaller ones often need to hire a consulting group. These engineers update a computer network and fix problems whenever they arise. If you want to become a network engineer, you need a love of computers as well as terrific problem-solving skills. == Bachelor's degree in computer engineering or computer science. == Step 1 Study a computer-related field in college. Despite the name, network engineering doesn't require an engineering degree. You could also study a completely different major and minor in information technology.

Step 2 Get a job at your university's office of information technology. Most large schools hire student IT support to work in both classroom and dorm environments. These jobs generally require 1 to 2 years of computer-related study and are a great way to build your resume.

Step 3 Learn to use all different kinds of operating systems. Most network administration computers use a different operating system than the office computers and company laptops. You'll need to be familiar with all of them in order to become a network engineer.

Step 4 Look for an internship with the IT department of a company or with a computer consulting firm. The number of students majoring in computer-related fields is growing, so you will need experience to help you stand out from the pack.

Step 5 Work on your communication skills. If you become a network engineer, you'll often have to work with people who aren't as tech-savvy as you. You should learn to explain computer problems in straightforward language. Consider taking an acting, improv or speech class to hone your communication skills.

Would you connect to an Unsecured Wireless Network?

The rule generally is connect to an unsecured wireless network at your own risk. The security risk to your privacy and device are high. Its not advisable at all

Why would you need wtls to implement wireless transport layer security?

To Provide needed security measures and Privacy for Wireless application protocol (WAP) clients and servers

To provide a suitable security protocol given the limited memory,bandwidth, and processor capabilities of WAP clients

Why is header checksum required in TCP?

Its used to detect an error if the packet may be mis-routed. I'm not 100% sure.

What is transparent firewall?

Since the fundamental task of a firewall is to filter packets, the weak point in its traditional behavior is the fact that it also must route packets after a decision is made. Can the model be simplified? Of course it can, and the answer comes by stepping down a layer in the OSI model. Instead of the device handling packets at layer 3 (network), what if it merely inspected frames and moved them to the proper interface? Sound familiar? This type of device would continue to filter packets, but operate at layer 2 (data link), like a bridge. Such a device has come to be known by several names: a transparent, in-line, shadow, stealth or bridging firewall.

ranajoy karmakar@gmail.com

ccna,network engineer

How do you find a wpa key for a wireless network without it hooked up to my computer?

You can't. If you do not know it and there is no other computers connected to the same router, there is no way you can get the key without setting up a new one.

Do content filters stop banned websites appearing in search engine results lists?

They might; although it is more possible that the proxy is looking at where the website is located (by IP address) rather than content.

How can you keep your personal files private when sharing cable broadband with roommates?

use a different userid for everyone, and keep the permissions private to those users.

You may also want to consider encrypting your files; then, even if your roommates could see the file they can't understand whats in it.

What is password selection strategies?

Password Selection Strategies

  • Reactive password checking:
    • The system periodically runs its own password cracker to find guessable passwords.
    • The system cancels passwords that are guessed and notifies user.
    • Consumes resources.
    • Hackers can use this on their own machine with a copy of the password file. Can they get the password file?
  • Proactive password checking:
    • The system checks at the time of selection if the password is allowable.
    • With guidance from the system, users can select memorable passwords that are difficult to guess.

What is different between novell network and Microsoft network?

The primary difference is that when using a workstation as a Novell client, you're most likely connecting to a Novell network, and when using one as a Microsoft Client, you're most likely connecting to a Microsoft network.

Novell and Microsoft's models of network security differ. Microsoft has their Active Directory (which arguably a lot of which has been stolen from Novell), and Novell has their NDS (Novell Directory Services).

In terms of your computer connecting to one of these networks, it'll differ between a Novell and Windows network in some technical ways, but from a user's perspective things remain pretty similar.

How do you destroy a district firewall?

Find the server room. Apply any liquid to the server rack.

You'll have destroyed the firewall.

What is patch coverage?

Patches are typically small updates to some software that either fix a security flaw or another functional flaw in part of the software. They are usually one or a few files that are changed to fix the flaw by replacing older versions of these files. Another kind of much larger patch is called a service pack and this usually is just a wrapping together of the changes that were previously made by smaller patches into a larger package. Software products exist to manage the patching process on larger groups of machines for network administrators. These products typically try to focus their "patch coverage" on the most commonly exploited (for the security flaws patches) or used products that require patches on these networks, most commonly for Windows networks. Patch coverage is related to the number of products patched by the management software.

What are the things to be monitored on a network?

Each device will have different requirements, and even then, you'll need to decide what you want to monitor and why. Are you interested in disk space? CPU utilization? Do you want to make sure that a certain application or service is running on a device? The more complex network monitoring solutions can do just that, and anything else your mind can dream up.

What is server rollback?

When a server is restored from a backup, usually due to a fault or error occurring on the system.