answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

Is Ethernet more secure?

Ethernet is more "physically secure", in that it is sometimes more difficult to gain unauthorized access to a network, since you need to be in close physical proximity to a network cable. However, it does not require any form of cryptographic authentication to connect to a network, which can be optionally provided by wireless.

Which layer device is IDS?

Actually, an IDS does not sit on one particular layer. It has to examine packets for protocols, how they are being transported, number of packets transmitted, spoofing information, and application layer information.

In general terms, Intrusion detection system and Intrusion prevention system is a Layer 4 device. It filters for malicious data.

What is rule-based detection in network security?

One example of rule-based detection might be to use thresholds. For example, perhaps you have a firewall with a rule that if more than 100 connections per second are initiated from any external source, to block that source. Or , a certain amount of email recipients per one sender might be considered spam detection.

Suppose you wanted to share documents among several computers in your household in?

Buy a lan router, they can be used with lan cable or wireless to connect all your computers through a network. If there are only two computers that you wish to connect then you only need on lan cable which you connect in the back of each of those two computers to create a network.

What is the best Security Plus study guide?

Studying can be different for different people. I've found both the Exam Cram guides and the Passport series of Mike Meyers to be very effective.

How you can register your company in camp Phoenix in afghanistan?

i can not register our new company in comp phoenix in Afghanistan

we opened a new construction company but we can not register our company

in your comps like comp phoenix comp egger comp bagram

so i wanna you to help our company our email address is frazmand2@gmail.com

thank

your serenely omid frazmand

I am wait for you respond to

frazmand2@gmail.com

What is tunneling protocal?

Tunneling, also known as "port forwarding," is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing node in the public network are unaware that the transmission is part of a private network. Tunneling is generally done by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data. Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network.

What is the Dijkstra's algorithm?

Dijkstra's algorithm has importance when you are trying to find the shortest path between two points. It's used in the computer networking field where routing protocols, like OSPF, uses it to find the shortest path between routers.

http://en.wikipedia.org/wiki/Dijkstra%27s_algorithm

What is Request-response paradigm?

request response paradigm is somthiing which define how request and response work in the web application or in real world.

First when the user open browser and hit any URL, request object is created.

This request object then send to the server. server finds the appropriate resources for that request and executes the logic (if any) ans send back response to the browser. Browser interprets the response and display result

What is the duration of ccna course?

CCNA Exam Details

Exam Name: 200-301 CCNA

Exam Duration: 120 minutes

No. of Questions: 100-120 questions

Passing Score: Varies, usually the score required is 800-850 out of 1000

Are firewalls considered an Environmental Threat?

Just an online threat, unless you take the term 'firewall' literally and light up a forest. :P

Can people in your network see the websites you visit from their computers is it safe to look up a birthday present health problem or something seedier without fear your flatmates can see?

If you mean people you share the network with, the answer is yes. They can see what you are doing if they have proper software for that. The only way you can protect yourself is to use proxy server, or another kind of encrypted connection.

Where can one purchase a home network attached security or NAS?

One can purchase a home network attached security from many different online stores. Some examples of websites that sell NAS's include NewEgg and Amazon.

Are there any technical job opportunities in IT security in Boise Idaho?

There are many technical job opportunities in IT security in Boise, Idaho. They range from jobs like Microsoft technology to Cisco router security, etc.

List three controls that could be applied to detect or prevent salami attack?

- Operational auditing should be rigorous.

- If the risk involved is great, quality assurance practices in programming should be serious

What is the Source code for longitudinal redundancy check in C language?

It depends on the language you want to use. Here is a VB example:

http://bytes.com/topic/visual-basic-net/answers/443023-lrc-calculation-algorithm

Can you use a information systems security degree to become a network engineer?

Maybe; it all depends on the employer and the job description in terms of what they expect you to know and duties to perform. There will in any case regardless of degree be some on the job training.

Remember that an information security degree concentrates on the security aspect of networking (among other things) and not the day-to-day process of troubleshooting and extending networks. However, you do (or should have) the preliminary knowledge for network engineer as well.

What is Quality of service in tcp ip?

Quality of Service (QoS) is a technique to manage how well the network is performing. It uses service metrics to figure out where problems and bottlenecks might be in a network and measures transmission times, re-transmits, and other measurable qualities in a network.

There are some protocols and networks that require a high degree of functioning, and the way to tell whether or not the network is functioning properly is by sampling what the network is doing. This is the purpose of QoS.

Which man page section refers to system calls?

There are several 'man' sections for system calls. The basic system calls for the C api are in section 2, which is pretty much the default. Others may be in 3C, 3S, etc., depending on the type of functionality they have. For example, a lot of the string related functions are in 3S.

Anything that has an admin type of API requirement might be in sections 5 and 8, or 8m, etc., depending on the OS type.

What OSI model guarantees reliable message delivery?

The Transport layer which handles segments is responsible for End-to-End connections and reliability. Problems at this layer can negatively impact reliable message delivery.

Although the Transport layer is supposed to be where reliability is provided, problems at the Network layer where packets are handled can also significantly affect reliable message delivery if the path determination and/or IP (logical addressing) are messed up.