Solution
a)
i)Computer Viruses
A computer virus is a program that attaches itself to a program or file so it can spread
from one computer to another computer
ii)Computer worms
Computer worm is one type of virus
The major difference between worm and virus is it will spread from one computer to another computer without human help
Computer Worms used to slow the network by consuming too much memory
iii)Trojan horses
Trojan horse looks like a genuine software but it will do damage if you install and run on your computer
Trojan Horse creates backdoor for all the malware in your system
--
B)
Computer Virus more or less it is similar like biological virus, Biological virus will spread by inserting itself into living cells.
In both computer virus and biological virus insertion of virus is called infection
Antibiotic is required to cure biological virus
Antivirus is required to remove computer virus
--
the c part in the question 1
and question 3 picture is not clear
please repost the question with good quality picture
love to answer
all the best
answer all the questions if you can not, at leaset answer the assigned ones Windoes Firewa...
Question 1 1 The time to live field of IP header can prevent -------- in packet forwarding Question 2 In TCP connections, RST packets are used to --------- Question 3 (Multiple answers if applied) The protocol field of the IP header can be A) IP B) TCP C) ICMP D) UDP E) ARP Question 4 Frame exists in ------, packet exists in ------ , data segment existis in------ of TCP/IP model. Question 5 A web browser is -------- --------------- Question...
1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...
Can anyone answer and explain the following questions from Into to Computer Networking course? 1) PTSN networks are: a) Packet-switching networks offering connection-oriented services b) Packet-switching networks offering connectionless services c) Circuit-switching networks offering connection-oriented services d) Circuit-switching networks offering connectionless serive 2) Connection setup and temination, if performed, takes places in this layer of the internet model a) Presentation layer b) Session layer c) Network layer d) Physical layer 3) UDP sockets are identified by: a) Client program port...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) The grouping of two or more class networks together is called a CIDR block. True or False? 1) _______ 2) The User Data Protocol (UDP) is used to speed up data transfers. True or False? 2) _______ 3) Two host bits are borrowed if four subnets are to be created. True or False? 3) _______ 4) A host computer is assigned the IP address...
1. How many hosts can reside on a single Class C network? 1. 65535 2. 256 3. 254 4. 127 2. Select the invalid IP address 1. 95.31.0.15 2. 143.256.11.2 3. 24.123.33.60 4. 135.10.243.1 3. What layer in the TCP/IP protocol suite would a Web Browser reside? 1. Data Link 2. Application 3. Network 4. Physical 4. If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the...
166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...
1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...
Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it reduces the amount of work needed in physical delivery. Do not use any example in the book, the postal service, or the telephone network.1.2 A firm is assigned the network part 128.171. It selects a 10-bit subnet part. a) Draw the bits for the four octets of the IP address of the first host on the first subnet. (Hint: as we don’t use all...
Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...