Question

In: Computer Science

Q12. It has been determined that all 150 workstation in your organisation are compromised and have...

Q12. It has been determined that all 150 workstation in your organisation are compromised and have been flooding the website of a political party. which of the following statements concerning this attack is False? A) the attacker would probably be using a command and control server. b) botnets are autonomous choosiing targets and coordinating their own attacks. C) This is DDoS attack d) Firewalls would bee able to detect and mitigate this type of attack. Q13) whem samantha arrives in the country she uses the australian smart gate facility to authenticate and permit entry after electronic facial recogination. which of the following staement concerning this form of aucthentication is False? a) This is controversial form authentication beacausse it can be done without a person knowing it is being done. b) Another example of this type of authentication is finger print scanning. c)This is called two Factor authentication. c) This form of authentication is called biometrics. Q14).Which of the following is metric of network Quality - of - Service? a) Latency b) Network speed. c) Network availibility. d) All of them Q15. My network has significant problem with ' jitter'. Which of the following statement concerning my network is TRUE? a). I would notice the effect of jitter while using real- time streaming application like skype. b). The constant high latency on my network would make it difficult to conduct VoIP conversation. c). I would notice the effect of jitter when he opened document stored in the cloud. d). Jitter would lead to a high error rate on my network

Solutions

Expert Solution

Hello, Student I hope you are doing good n well in lockdown.

Here is answers of all of your questions with some explanations to clear everything, if still there is any doubt then feel free to ask in comment section I am always happy to help you.

And Do not forget to upvote .

Q12) It has been determined that all 150 workstation in your organisation are compromised and have been flooding the website of a political party. which of the following statements concerning this attack is False?

A) the attacker would probably be using a command and control server.

B) botnets are autonomous choosiing targets and coordinating their own attacks.

C) This is DDoS attack

D) Firewalls would bee able to detect and mitigate this type of attack

Answer : - (D) Firewalls would bee able to detect and mitigate this type of attack

Explanation : - This statement is false about this attack because  firewalls can mitigate only some types of DDoS attacks, they can still be overloaded by protocol attacks.

Firewalls can not protect the website of a political party from all of the threats that are out there.

Q13) whem samantha arrives in the country she uses the australian smart gate facility to authenticate and permit entry after electronic facial recogination. which of the following staement concerning this form of aucthentication is False?

A) This is controversial form authentication beacausse it can be done without a person knowing it is being done.

B) Another example of this type of authentication is finger print scanning.

C)This is called two Factor authentication.

D) This form of authentication is called biometrics.

Answer : -  A) This is controversial form authentication beacausse it can be done without a person knowing it is being done.

Explanation : - This can not be controversial of form authentication because It is valid form to authentication in those countries and there will be mentioned board So it can not be controversial form of authentication.

And This process that a person can not pass without authentication him/her self.

Q14 ) Q14).Which of the following is metric of network Quality - of - Service?

a) Latency

b) Network speed.

c) Network availibility.

d) All of them

Answer : - All of them

Explanation : - To ensure network Quality - of - Service Good Network Latency , fast netwrok speed and Network availibility must be there.

Q15) Q15. My network has significant problem with ' jitter'. Which of the following statement concerning my network is TRUE?

a). I would notice the effect of jitter while using real- time streaming application like skype.

b). The constant high latency on my network would make it difficult to conduct VoIP conversation.

c). I would notice the effect of jitter when he opened document stored in the cloud.

d). Jitter would lead to a high error rate on my network

Answer : - The constant high latency on my network would make it difficult to conduct VoIP conversation.

Explanation : - We all know that in telecommunications, jitter refers to the variation in the latency of packets carrying voice or video data over a communications channel. So if there is constant high latency on network then it would make difficult to conduct VoIP conversation.

Please hit that like or thumbs-up button, it really motivates me<3

Thank you!!

Have a nice day:)


Related Solutions

The supply and demand curves for gasoline have been determined: Qd = 150 - p Qs...
The supply and demand curves for gasoline have been determined: Qd = 150 - p Qs = 2p A) Calculate the economic benefit, the price counts efficiency and the ratio price counts and Calculate the private income of the 20 units produced. What is the market price? B) Now suppose that the consumption tax of $ 6 per unit is still in force. A project that will use 10 gasoline units as input. Graphically illustrate this cost.
You have been employed to establish a computerised accounting system in a small organisation. The organisation...
You have been employed to establish a computerised accounting system in a small organisation. The organisation currently uses a ledger card system for its accounts. The organisation has chosen a popular proprietary accounting software system. Describe the steps to be taken prior to inputting the data into the computerised system and how you would go about implementing the new system. You must show that you can: set up an organisation’s chart of accounts by modifying an established integrated financial software...
Assessment brief/activity Your CEO is considering outsourcing the HR function in your organisation. You have been...
Assessment brief/activity Your CEO is considering outsourcing the HR function in your organisation. You have been tasked with Criteria highlighting the value of the HR function to the business. You are required to provide written answers to the questions below. Question 3 Evaluate the business case for managing HR in a professional, ethical and just manner. Assessment criteria 1.3 Evaluate the business case for managing HR in a professional, ethical and just manner. Guidance Here, you need to explain how...
1. What advice would you provide to a company that has been compromised by a hacker?...
1. What advice would you provide to a company that has been compromised by a hacker?
What advice would you provide to a company that has been compromised by a hacker? (6...
What advice would you provide to a company that has been compromised by a hacker? Subject Information Security.
Suppose you have been hired as a security consultant in a large organisation ABC.org, which has...
Suppose you have been hired as a security consultant in a large organisation ABC.org, which has offices in three different countries: New Zealand, the USA, and the UK. This organisation wishes to use a VPN (Virtual Private Network) for internal employees. This organisation has decided to use IPSec-powered VPN. This organisation also uses NAT (Network Address Translation) and multiple network firewalls. Question: Please explain how the IPSec gateway, NAT router, and personal firewall must be arranged to provide efficient and...
Suppose you have been hired as a security consultant in a large organisation ABC.org, which has...
Suppose you have been hired as a security consultant in a large organisation ABC.org, which has offices in three different countries: New Zealand, the USA, and the UK. This organisation wishes to use a VPN (Virtual Private Network) for internal employees. This organisation has decided to use IPSec-powered VPN. This organisation also uses NAT (Network Address Translation) and multiple network firewalls. Question: (a) Suggest whether the tunnel mode or the transport mode is better for the organisation’s VPN. Justify your...
Most consumers don’t think about security or privacy until it has been compromised and they must...
Most consumers don’t think about security or privacy until it has been compromised and they must deal with the consequences. Your manager at the CPA firm where you work has asked you to produce a customer-oriented security and privacy brochure as part of a rollout plan for new online services the firm plans to offer. When asked for the details of these services so you can write about them, the reply is “I want you to tell me what typical...
Suppose a workstation receives parts automatically from a conveyor. An accumulation line has been provided at...
Suppose a workstation receives parts automatically from a conveyor. An accumulation line has been provided at the workstation and has a storage capacity for 5 parts (N=6). Parts arrive randomly at the switching junction for the workstation; if the accumulation line is full, parts are diverted to another workstation. Parts arrive at a Poisson rate of 1 per minute; service time at the workstation is exponentially distributed with a mean of 45 seconds. a. What is the rate at which...
Choose an organisation and comment on how they have been engaging with issues of sustainability in...
Choose an organisation and comment on how they have been engaging with issues of sustainability in recent years. How have they done well, and how have they done badly?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT