Network Security - Data Encryption Standard (DES) weakness and strength - The Data Encryption Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext...........
|
Network Security - The function of a denial of service attack is to flood its target machine with too much traffic.............
|
Network Security - What are Brute Force Attacks? - Brute forcing is a mechanism which is used by an attacker to break the encryption............
|
Network Security - How do you use RSA for both authentication and secrecy? - RSA is a public key encryption algorithm. The RSA algorithms are based...........
|
Network Security - Can you differentiate among encoding, encryption and hashing? - RSA is a public key encryption algorithm. Encoding: Basically encoding is used to protect the integrity of data as............
|
Network Security - A secure hash function should have the following characteristics:.......
|
Network Security - A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance............
|
Network Security - Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.............
|
Network Security - The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape..............
|
Network Security - What is PIX firewall security? How does it differ from a firewall? - It is a popular IP firewall and NAT (Network Address Translation) appliance..............
|
Network Security - What are Malware? Explain different types of Malware - Malware is a software program which is developed to destroy a computer system...............
|
Network Security - What are replay attacks? - Replay attacks are the network attacks in which an attacker spies the conversation...............
|
Network Security - ‘encrypt’ and ‘compress’ data during transmission - Data should be transmitted over any communication network in such a way..............
|
Network Security - What is the goal of Information Security in an organization? - Confidentiality, Integrity and Availability...............
|
Network Security - Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption...............
|
IP (Internet Protocol) - Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination........
|
Classes of IP address - IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format........
|
Broadcast, Unicast and Multicast - Unicast: A term used in communication to describe a piece of information to send from one point to another........
|
What is Network Mask? - A network mask is used for determination of what subnet an IP address belongs to........
|
Subnetting - A subnet describes a set of networked computers which have common IP address routing prefix.........
|
User Datagram Protocol (UDP) - User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol.......
|
TCP Windowing concept - TCP Windowing is a concept that is used for avoiding congestion in the network traffic........
|
Domain Name System (DNS) - A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet........
|
What is the TTL (Time to Live)? - TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet........
|
Use of Internet Control Message Protocol (ICMP) - Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite.........
|
What is the use of IGMP protocol? - Internet Group Management Protocol: - It allows internet hosts to participate in multicasting.........
|
What are Ping and Tracert? - Ping and tracert are the commands used to send information to some remote computers to receive some information..........
|
Explain RSVP. How does it work? - Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network.......
|
Explain the concept of DHCP - Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network.........
|
differences between a domain and a workgroup - In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup........
|
Explain how NAT works - Network Address Translation translates and IP address used in a network to another IP address........
|
What is PPP protocol? Explain PPP packet format - Point to Point protocol helps communication between 2 computers over a serial cable, phone line or........
|
What is IP Spoofing and how can it be prevented? - IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the........
|
IP datagram, Fragmentation and MTU - IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged.........
|
What is an application gateway? - An application gateway is an application program that runs on a firewall between two networks. An.........
|
Circuit Level Gateway - A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be.........
|
What is 'Gateway Of Last Resort'? - A Gateway of Last Resort or Default gateway is a route used by the router when no other known route.........
|
What are switches? Explain the concepts of Layer-3 switches - It is a device that connects multiple network segments..........
|
What is Router? Explain components of Routers - The way switches connect multiple computers, a router connects multiple networks. Routers comprise .........
|
Overview of OSI layer - OSI stands for Open Systems Interconnection........
|
Different layers in the OSI model - Application Layer: Closest to the end user, Interact directly with the software application........
|
Unicast IP Addresses - It is an IP address that uniquely identifies a host in a network..........
|
What is IP Multicasting? - It is an IP address that identifies a particular group of hosts in network.........
|
Classes of IP addresses. Why do we need them? .........
|
What is Subneting? Explain the advantages of using Subneting - Subneting is dividing a network into several subnets......
|
What is Superneting? Concept of custom Subneting - Supernetting or Classless Inter-Domain Routing (CIDR)........
|
What is VLSM, Variable length subnet masking? - VLSM is a means of allocating IP addressing resources to subnets according to their individual need .......
|
What is Data Fragmentaion? Explain how Data Fragmentaion works - Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced. ........
|
Concepts and capabilities of IP Datagram - Data transmitted over an internet using IP is carried in messages called IP datagrams.........
|