answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What are five ways that you can reduce or control risk when driving?

Keep your vehicle in top condition, Anticipate the actions of others, Protect yourself and others, Drive only when you're in sound physical and mental condition, make a conscious effort to develop your driving skills.

Which cryptographic algorithms is a symmetric encryption method?

Twofish, Advanced Encryption Standard, Blowfish, Serpent, CAST 5, RC4, TDES, and IDEA are all examples of symmetric encryption methods. In short, any algorithm that uses the same or similar cryptographic keys for encryption and decryption is a symmetric encryption method. Symmetric encryption methods are also divided into two different categories, stream ciphers and block ciphers. These two encryption methods are much like the difference between an interpreter and a compiler in programming. Stream encrypts individual bytes one at a time, while Block encrypts volumes as a whole.

In a networked environment no authorized computer user can access data and information stored on other computers on the network?

I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so.

I understand what you mean, and the answer to that is FALSE.

Which type of Intrusion Detection System can only take logging and alerting types of actions when an attack is identified?

Passive Systems

A passive intrusion detection sensor detects and potential security breach, logs the information and signals an alart on the console, but does not take any preventive measures to stop the attack.

Advantage and disadvantage of bus network?

Advantages:

  1. Easy to expand
  2. Doesn't require special devices other than the cabling
  3. No special configuration necessary to create it
Disadvantages:

  1. Not very scalable
  2. Any device that fails can bring down the entire network
  3. Limited number of devices per network segment
  4. Time-consuming to find the failed device

Computer security and types of computer security?

Clario Tech Limited the UK-based company present product MacKeeper, an award-winning system utility which includes a set of powerful maintenance features for Mac Optimization, Security, Data Control and Cleaning. So it is like 911 for your Mac.

cutt.ly/bhCTZsA

How many types of data transmission model of computer networking?

There are mainly three types of transmission modes : 1) Simplex : Information can flow only in one direction 2) Half Duplex : Information can flow in both direction but only 1 at a time can send and 1 can receive. 3) Full Duplex : Information can flow in both direction and both can send and rceive at a same time.

How many keys are utilized in asymmetric encryption?

Asymmetric encryption uses at least 2 keys - hence the asymmetry. The keys for encryption and decryption are not the same, so they are not "symmetric". Usually only 2 keys are used - a public key and a private key. The public key is published to a key registry or sent separately to those the key-pair owner wants to communicate with. The private key is retained by the owner. Messages encrypted with the private key can only be decrypted using the public key. If the source of the public key is trusted, this provides some proof of the source of the message. Messages encrypted with the public key can only be decrypted using the private key - so only the owner of the private key should be able to decrypt messages encrypted with their own private key.

What protocol secured file transfer system and default port?

The Secure File Transport Protocol (SFTP, also known as SSH or Secure Shell) typically is run on port 22.

What is the encryption method used with wpa2?

WPA2 is capable of using several different encryption types. WPA2 (as opposed to WPA) introduced CCMP, a new AES-based encryption mode. In addition, WPA2 can operate in PSK, also known as Personal mode, which is designed for home and small office networks that don't require the complexity of an 802.1X authentication server. The wireless network device encrypts the network traffic using a 256 bit key. The key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 ASCII characters. If the ASCII characters are used, the 256 bit key is calculated by applying the PBKDF2 key derivation function to the passphrase and using the SSID as the "salt"or initialization parameter and 4096 iterations of HMAC-SHA1.Answers.com

What is port 69 why is it used and how to unblock it?

Port 69 is just one of thousands of ports inside your "firewall".It is used sometimes by viruses and certain programs to get information or to sneak in and mess up or break your computer.You can unblock it via your firewall menu.

UDP Port 69 refers to Trivial File Transfer Protocol (TFTP), a file transfer protocol (FTP), implemented on User Datagram Protocol (UDP), that uses a very small amount of memory, so it was used to boot hardware devices that had no real data storage devices (fixed disk/hard drives). TFTP only reads and writes files (or mail) from/to a remote server. It cannot list directories, and currently has no provisions for user authentication, so unblocking the protocol might open a vulnerability to attacking your workstations. However, if you're sure you want to do this, you simply create a new rule, or modify existing rules, on your firewall(s), choosing whether you want to block the protocol inbound, outbound or both.

Work schedule of computer networking technician?

it does depend on the situation if the network is down we try to get it back running fast

if its a new installation or equipment or running of net nertwork cable it depends how much work is needed to be done

new installs can yake a day, week or month....

How effective is encryption software?

The encryption software available for modern computers is generally pretty hard to crack. Just as long as the program is written properly and you use it properly, encryption software is fairly easy to use, acquire, and very effective.

How do you re assemble a security system?

Need a lot more information in order to be able to answer this question, and, even then, the best answer will be to leave it to a professional.

How do you get into a security enabled network?

You have to use the same security settings for your wireless adapter that the network you are attempting to join is using. You need to configure the encryption type (WEP, WPA, WPA2, etc.), and the key in order to join the network. If you do not have this information, contact the network administrator. If this is a home network, contact the person who set it up.

Name a few configuration options related to mailbox stores?

Managing mailbox setting

Changing e-mail addresse

Configuring mailbox permissions

Deleting mailboxe

Moving mailboxes

Reconnecting a disconnected mailbox in Active Directory

Hiding a mailbox from the Global Address List (GAL)

Specifying storage limits.

Specifying delivery restrictions on a mailbox.

Forwarding mailboxes to other e-mail addresses.

Configuring and managing contacts.

Change the status of Exchange features for mail-enabled objects