2.99 See Answer

Question: What is computer forensics?


What is computer forensics?


> Describe the three stages of standardization.

> Explain how a message is transmitted from one computer to another using layers.

> How many bits (not bytes) are there in a 10 page text document? Hint: There are approximately 350 words on a double-spaced page.

> Describe the seven layers in the OSI network model and what they do.

> Why are network layers important?

> What is a server?

> What do trouble tickets report?

> What does a help desk do?

> Of the different types of multiplexing, what distinguishes: a. Frequency division multiplexing (FDM)? b. Time division multiplexing (TDM)? c. Statistical time division multiplexing (STDM)? d. Wavelength division multiplexing (WDM)?

> What is performance and fault management?

> What is desktop management, and why is it important?

> People tend to think of software when documentation is mentioned. What is documentation in a network situation?

> Describe what configuration management encompasses.

> Why is combining voice and data a major organizational challenge?

> Many organizations do not have a formal trouble reporting system. Why do you think this is the case?

> How does network cost of ownership (aka real TCO) differ from total cost of ownership? Which is the most useful measure of network costs from the point of view of the network manager? Why?

> How does content caching differ from content delivery?

> What is capacity management?

> What is policy-based management?

> How does DSL (digital subscriber line) work?

> What is server virtualization?

> How does a load balancer work?

> Compare and contrast device management software, system management software, and application management software.

> What is firefighting?

> What is SNMP and RMON?

> What do network management software systems do and why are they important?

> How can network costs be reduced?

> Why is the TCO so high?

> What is TCO?

> What are the primary functions of end user support?

> What is the purpose of multiplexing?

> What are the advantages and disadvantages of host-based networks versus client–server networks?

> What is problem escalation?

> How is network availability calculated?

> What is an SLA?

> Several important statistics related to network uptime and downtime are discussed in this chapter. What are they, and why are they important?

> What skill does a network manager need?

> Why is it important to identify improvements that are needed to mitigate risks?

> What are the possible risk control strategies? How do we pick which one to use?

> What is the purpose of the risk score, and how is it calculated?

> Explain the purpose of threat scenarios. What are the steps in preparing threat scenarios?

> Although it is important to protect all servers, some servers are more important than others. What server(s) are the most important to protect and why?

> What is the term used to describe the placing of two or more signals on a single circuit?

> What is one of the major risks of downloading unauthorized copies of music files from the Internet (aside from the risk of fines and lawsuits)?

> Some experts argue that CERT’s posting of security holes on its website causes more security break-ins than it prevents and should be stopped. What are the pros and cons on both sides of this argument? Do you think CERT should continue to post security h

> Most hackers start their careers breaking into computer systems as teenagers. What can we as a community of computer professionals do to reduce the temptation to become a hacker?

> A few security consultants have said that fast Internet and wireless technologies are their best friends. Explain.

> What are the most common security threats? What are the most critical? Why?

> What is a honey pot?

> How does IPS anomaly detection differ from misuse detection?

> What is an IPS?

> What techniques can be used to reduce the chance that social engineering will be successful?

> What is quantizing error?

> What is social engineering? Why does it work so well?

> Why the management of user profiles an important aspect of a security policy?

> Explain how a biometric system can improve security. What are the problems with it?

> What are the different types of two factor authentication methods and how do they work?

> What are the three major ways of authenticating users? What are the pros and cons of each approach?

> What are some of the criteria that can be used to rank security risks?

> How does SSL differ from IPSec?

> How does PGP differ from SSL?

> What is a Certificate Authority (CA)?

> What is PKI, and why is it important?

> Explain how pulse code modulation (PCM) works.

> Explain how authentication works.

> Compare and contrast DES and public key encryption.

> How does DES differ from 3DES? From AES?

> What is key management?

> Describe how asymmetric encryption and decryption work.

> Describe how symmetric encryption and decryption work.

> Name and describe the main impact areas. Who should be responsible for assessing what is meant by low/medium/high impact for each of the impact areas? Explain your answer.

> Compare and contrast symmetric and asymmetric encryption.

> Explain how a Trojan horse works.

> What is a security hole, and how do you fix it?

> What data compression standard uses Lempel–Ziv encoding? Describe how it works.

> What is a NAT firewall, and how does it work?

> What is IP spoofing?

> How do the different types of firewalls work?

> What is a firewall?

> What is a sniffer?

> What is eavesdropping in a computer security sense?

> What is physical security, and why is it important?

> Briefly outline the steps required to complete a risk assessment.

> How do you secure the network perimeter?

> What are major aspects of intrusion prevention?

> Some experts argue that thin-client client–server architectures are really host-based architectures in disguise and suffer from the same old problems. Do you agree? Explain.

> There are many components in a typical security policy. Describe three important components.

> People who attempt intrusion can be classified into several different categories. Describe them.

> What is online backup?

> What is a disaster recovery firm? When and why would you establish a contract with them?

> How does a denial-of-service attack differ from a distributed denial-of-service attack?

> Explain how a denial-of-service attack works.

> What is a computer virus? What is ransomware?

> What is the purpose of a disaster recovery plan? What are five major elements of a typical disaster recovery plan?

> What factors have brought increased emphasis on network security?

> How does a DSL modem differ from a DSLAM?

> Which of the common application architectures for email (two-tier client–server, Web-based) is “best”? Explain.

> Explain how DSL works.

> Compare and contrast cable modem and DSL.

> What type of circuits are commonly used to build the Internet today? What type of circuits are commonly used to build Internet 2?

2.99

See Answer