The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 2 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Â
13. TCP is a robust protocol: Sequencing and error correction are ensured, but there
is a penalty in overhead (for example, if no resequencing or error correction is
needed). UDP does not provide these services but is correspondingly simpler. Cite
specific situations in which the lightweight UDP protocol could be acceptable, that is,
when error correction or sequencing is not needed.
17. A port scanner is a tool useful to an attacker to identify possible vulnerabilities in
a potential victim's system. Cite a situation in which someone who is not an attacker
could use a port scanner for a nonmalicious purpose.
19. Compare copper wire, microwave, optical fiber, infrared, and (radio frequency)
wireless in their resistance to passive and active wiretapping.
26. Syn flood is the result of some incomplete protocol exchange: The client initiates
an exchange but does not complete it. Unfortunately, these situations can also occur
normally. Describe a benign situation that could cause a protocol exchange to be
incomplete.
27. A distributed denial-of-service attack requires zombies running on numerous
machines to perform part of the attack simultaneously. If you were a system
administrator looking for zombies on your network, what would you look for?
Â
contact me for any inquiries.
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y