2.99 See Answer

Question: How does a denial-of-service attack


How does a denial-of-service attack differ from a distributed denial-of-service attack?


> What is the term used to describe the placing of two or more signals on a single circuit?

> What is one of the major risks of downloading unauthorized copies of music files from the Internet (aside from the risk of fines and lawsuits)?

> Some experts argue that CERT’s posting of security holes on its website causes more security break-ins than it prevents and should be stopped. What are the pros and cons on both sides of this argument? Do you think CERT should continue to post security h

> Most hackers start their careers breaking into computer systems as teenagers. What can we as a community of computer professionals do to reduce the temptation to become a hacker?

> A few security consultants have said that fast Internet and wireless technologies are their best friends. Explain.

> What are the most common security threats? What are the most critical? Why?

> What is a honey pot?

> What is computer forensics?

> How does IPS anomaly detection differ from misuse detection?

> What is an IPS?

> What techniques can be used to reduce the chance that social engineering will be successful?

> What is quantizing error?

> What is social engineering? Why does it work so well?

> Why the management of user profiles an important aspect of a security policy?

> Explain how a biometric system can improve security. What are the problems with it?

> What are the different types of two factor authentication methods and how do they work?

> What are the three major ways of authenticating users? What are the pros and cons of each approach?

> What are some of the criteria that can be used to rank security risks?

> How does SSL differ from IPSec?

> How does PGP differ from SSL?

> What is a Certificate Authority (CA)?

> What is PKI, and why is it important?

> Explain how pulse code modulation (PCM) works.

> Explain how authentication works.

> Compare and contrast DES and public key encryption.

> How does DES differ from 3DES? From AES?

> What is key management?

> Describe how asymmetric encryption and decryption work.

> Describe how symmetric encryption and decryption work.

> Name and describe the main impact areas. Who should be responsible for assessing what is meant by low/medium/high impact for each of the impact areas? Explain your answer.

> Compare and contrast symmetric and asymmetric encryption.

> Explain how a Trojan horse works.

> What is a security hole, and how do you fix it?

> What data compression standard uses Lempel–Ziv encoding? Describe how it works.

> What is a NAT firewall, and how does it work?

> What is IP spoofing?

> How do the different types of firewalls work?

> What is a firewall?

> What is a sniffer?

> What is eavesdropping in a computer security sense?

> What is physical security, and why is it important?

> Briefly outline the steps required to complete a risk assessment.

> How do you secure the network perimeter?

> What are major aspects of intrusion prevention?

> Some experts argue that thin-client client–server architectures are really host-based architectures in disguise and suffer from the same old problems. Do you agree? Explain.

> There are many components in a typical security policy. Describe three important components.

> People who attempt intrusion can be classified into several different categories. Describe them.

> What is online backup?

> What is a disaster recovery firm? When and why would you establish a contract with them?

> Explain how a denial-of-service attack works.

> What is a computer virus? What is ransomware?

> What is the purpose of a disaster recovery plan? What are five major elements of a typical disaster recovery plan?

> What factors have brought increased emphasis on network security?

> How does a DSL modem differ from a DSLAM?

> Which of the common application architectures for email (two-tier client–server, Web-based) is “best”? Explain.

> Explain how DSL works.

> Compare and contrast cable modem and DSL.

> What type of circuits are commonly used to build the Internet today? What type of circuits are commonly used to build Internet 2?

> Explain one reason why you might experience long response times in getting a Web page from a server in your own city.

> What is a POP?

> What is an IXP?

> Many experts predicted that small, local ISPs would disappear as regional and national ISPs began offering local access. This hasn’t happened. Why?

> Would you be interested in subscribing to 100 Mbps FTTH for a monthly price of $100? Why or why not?

> Today, there is no clear winner in the competition for Broad-band Internet access. What technology or technologies do you think will dominate in 2 years’ time? Why?

> What is a giga-pop?

> Compare and contrast the application architecture for video conferencing and the architecture for email.

> What is Internet2®?

> Explain how the Internet is a network of networks.

> What is the principal American organization working on the future of the Internet?

> How is the IETF related to the IRTF?

> What are the principal organizations responsible for Internet governance, and what do they do?

> Explain how WiMax works.

> What are some future technologies that might change how we access the Internet?

> Explain how FTTH works.

> Which is better, cable modem or DSL? Explain.

> What is an OE converter? A CMTS?

> Explain how Instant Messaging (IM) works.

> Explain how a cable modem works.

> Explain how ADSL works.

> What is the basic structure of the Internet?

> Describe SONET. How does it differ from SDH?

> Distinguish among T1, T2, T3, and T4 circuits.

> What are the most commonly used T carrier services? What data rates do they provide?

> Compare and contrast ring architecture, star architecture, and mesh architecture.

> Is a WAN that uses dedicated circuits easier or harder to design than one that uses packet-switched circuits? Explain.

> Compare and contrast dedicated-circuit services and packet-switched services.

> How do Ethernet services work in the WAN?

> What is cloud computing?

> It is said that frame relay services and dedicated-circuit services are somewhat similar from the perspective of the network designer. Why?

> Suppose you joined a company that had a WAN composed of SONET, T carrier, and frame relay services, each selected to match a specific network need for a certain set of circuits. Would you say this was a well-designed network? Explain.

> Are there any WAN technologies that you would avoid if you were building a network today? Explain.

> Are Ethernet services a major change in the future of networking or a technology blip?

> Who regulates common carriers and how is it done?

> Describe five important factors in selecting WAN services.

> How can you improve WAN performance?

> Compare the three types of VPN.

> Explain how VPN services work.

> How do VPN services differ from common carrier services?

> What is Telnet, and why is it useful?

> Describe the four basic functions of an application software package.

2.99

See Answer