answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is the most common key length for PKI components?

Key lengths can be variable, but in general one should use a key length of 8 characters or more, or some key that can be at least 128 bits in length, or greater. Depending on the PKI technique used the key could vary anywhere from 128 bits to 2048 or more.

What does IDF stand for?

IDF has many meanings, here are the most common.

Intel Developer Forum

ÃŽle-de-France (region)

Israel Defence Force

International Diabetes Federation

Compare the TCP header and the UDP header?

Both TCP and UDP have origin and destination ports - and that is about all the similarity there is between the two. TCP has several other fields that UDP doesn't have, including window size; a consecutive byte numbering (to figure out where to place a TCP segment in a data stream); the bytes that the other side is expected to send; and others.

How many svchost exe processes are supposed to be running?

Depends on your system. SVChost processes are used for various system services, so there might be at least several. You should not worry too much as long as all svchost processes are launched from windows install subdyrectory system32

Explain the connection oriented connection less services using bind connect listen accept system calls?

Connectionless Service

In a connectionless service, the packets are sent from one party to another with no need for connection establishment or connection release. The packets are not numbered; they may be delayed, lost, or arrive out of sequence.

Connection-Oriented Services

In a connection-oriented service, a connection is first established between the sender and the receiver. Data are transferred. At the end, the connection is released.

Connection Establishment Connection establishment involves the following:

Host A sends a packet to announce its wish for connection and includes its initialization information about traffic from A to B.

Host B sends a packet to acknowledge (confirm) the request of A.

Host B sends a packet that includes its initialization information about traffic from B to A.

Host A sends a packet to acknowledge (confirm) the request of B.

This connection establishment implies the steps i.e. bind, connect, listen & accept

What is message control system?

A method for controlling messages in a software system. The method activates a report-handling module when a subroutine has a message to send. The subroutine passes an identification to the report-handling module. The subroutine then passes a message and message level to the report handling module. The report-handling module then determines the message level to be reported for that subroutine, the process from which that subroutine is sending messages and the message level to be reported for that process. If the message level of the message compares correctly to the message level of the subroutine and the process, the message is reported.

What kind of attack are hashed passwords vulnerable to?

Any password is vulnerable to a number of attacks. With hashed passwords it depends on a number of issues;

  • What is the length of the key
  • Can the attacker gain control of the hashes
You could use a brute force attack, for example. Hashes can be particularly sensitive to attacks utilizing rainbow or pre-computed hash tables as well.

1 Name three types of Ethernet What transmission speed does each support?

(From: Jean Andrews CompTIA A+ 6th Edition pg. 846)

The three variations of Ethernet are primarily distinguished from one another by speed:

(1) 10-Mbps Ethernet, (2) 100-Mbps or Fast Ethernet, and (3) 1000-Mbps or Gigabit Ethernet.

How do you get permission in my network with 2 Windows XP computers I set up a network for the computer and it says 'location You might not have permission to use this network resource'?

Your not being very specific about what your trying to get permission to do..?? And is this just a few computers connected to a wap, or are you going through a switch or a hub..??

What is personnel security management network?

Personnel security management network refers to a system or framework designed to ensure the protection of sensitive information and assets by managing the security of personnel within an organization. This includes conducting background checks, monitoring employee behavior, and implementing policies to mitigate risks related to insider threats. Such networks often involve collaboration between various departments, including human resources, security, and compliance, to create a comprehensive approach to safeguarding personnel and organizational integrity. Overall, it plays a critical role in maintaining a secure working environment.

What is used to protect the security of data on private networks?

Data encryption by creating unique digital signatures and scrambled data codes that can only be read by certain person or network.