• Home
  • Blog
  • I need help answering these questions

I need help answering these questions

0 comments

Please answer each question separately.

1. What are the various monitoring methodologies that firewalls use to examine incoming network traffic and detect abnormal/malicious activities? Which types are more effective and faster in identifying known threats (attack patterns)? Which types are more effective against complex and unknown threats?

2. Network administrators discover a certain type of malware that infects files and registries on compromised hosts and spreads rapidly/unknowingly through the network onto many computers and servers. What type of malware is this? What are several methods that can be used to detect/thwart this?

3.What are some of the main capabilities provided by digital signatures? What types of functions/algorithms are required to implement these capabilities?

4. Consider the following system diagram. Explain whether or not the following capabilities are supported: ( the attached pic is for this question)

pic_Q1.png

1. Does the above system support confidentiality of the transmitted plaintext message? If not how can it be added?

2. Does the above system support authentication of the sender Bob? If not how can it be added?

3. Does the above system support integrity of the transmitted plaintext message? If not how can it be added?

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}