answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is message control system?

A method for controlling messages in a software system. The method activates a report-handling module when a subroutine has a message to send. The subroutine passes an identification to the report-handling module. The subroutine then passes a message and message level to the report handling module. The report-handling module then determines the message level to be reported for that subroutine, the process from which that subroutine is sending messages and the message level to be reported for that process. If the message level of the message compares correctly to the message level of the subroutine and the process, the message is reported.

What kind of attack are hashed passwords vulnerable to?

Any password is vulnerable to a number of attacks. With hashed passwords it depends on a number of issues;

  • What is the length of the key
  • Can the attacker gain control of the hashes
You could use a brute force attack, for example. Hashes can be particularly sensitive to attacks utilizing rainbow or pre-computed hash tables as well.

1 Name three types of Ethernet What transmission speed does each support?

(From: Jean Andrews CompTIA A+ 6th Edition pg. 846)

The three variations of Ethernet are primarily distinguished from one another by speed:

(1) 10-Mbps Ethernet, (2) 100-Mbps or Fast Ethernet, and (3) 1000-Mbps or Gigabit Ethernet.

How do you get permission in my network with 2 Windows XP computers I set up a network for the computer and it says 'location You might not have permission to use this network resource'?

Your not being very specific about what your trying to get permission to do..?? And is this just a few computers connected to a wap, or are you going through a switch or a hub..??

What is used to protect the security of data on private networks?

Data encryption by creating unique digital signatures and scrambled data codes that can only be read by certain person or network.

What detection software automatically analyzes all network traffic assesses system vulnerabilities identifies any unauthorized acces and notifies a network administrator of suspiciou?

Intrusion Detection Systems (IDS) are software solutions that automatically analyze all network traffic, assess system vulnerabilities, and identify unauthorized access attempts. They monitor network activity for suspicious behavior and alert network administrators when potential threats are detected. Some IDS can also provide detailed reports and insights to help enhance network security measures. Examples include Snort and Suricata.

Information security professional to know the particular target environment to which they are assigned extremely well?

Information security professionals must possess a deep understanding of the specific target environment they are assigned to in order to effectively identify vulnerabilities and implement appropriate security measures. This knowledge includes understanding the organization's systems, processes, regulatory requirements, and potential threats unique to that environment. Such expertise enables them to tailor security strategies, ensuring that defenses are relevant and effective against real-world risks. Ultimately, an in-depth familiarity with the environment enhances the overall security posture and resilience of the organization.

Concept of unicast ip address?

A unicast message is a message directed to a specific device on a network (just one specific device). It would have a destination IP address that corresponds to that device.