Sunday, March 9, 2008

Quiz 1

1) Contact the network expert at your school or place of work. Find out which topology, communication links, and configuration are used in the network. IS it a LAN, MAN, or WAN?
* The topology, communication links, and configuration of roseclyde internet café is the LAN (Local Area Network).
2.) Discuss the primary difference between a bridge and a gateway and give real life example that uses each one?
*A bridge joins two similar types of networks so that they look like one network. The word transparent is often used with bridges because network clients do not know the bridge is even in place. A bridge must look at every packet on the network, not just those addressed to it. Thus it is possible to overload a bridge by putting it on a very busy network, even if very little traffic is actually going through the bridge.
*A gateway joins two dissimilar networks. There can be a lot of protocol conversion work to do. Often the gateway needs to be configured on client systems where communications are directed to the gateway and then some address mapping is provided to get the message to the recipient on the other side. Gateways have their own advantages and disadvantages. In general a gateway is more complex to design and to administer than a bridge. A gateway must participate in all of the protocols that it is designed to forward. For example, an IP gateway must respond to ARP requests. The IP standards also require it to completely process the IP header, decrementing the time to live field and obeying any IP options.
3.) Name three commercially-available operating systems for LANs and their vendor names. Explain the topology that each designed to manage and describe the access protocol it uses.
*The three commercially-available operating systems for LANs are the Windows 2000, Windows XP, Windows Server 2003, Windows Vista. This operating systems are created by the Microsoft Windows Corporation.
*Windows Vista’s network map uses the Link Layer Topology Discovery (LLTD) protocol to determine the network’s topology. The cool thing about it is that this is the same discovery topology used by XBOX 360. Microsoft automatically enables network mapping on home (private) networks, so if you happen to have an XBOX 360 on your home network, it should show up on the network map. Unfortunately, mapping is disabled on domain networks and public networks by default.
4.) Explain the similarities and differences between a file infector virus and a macro virus, including the types of files each infects.
*File infector viruses infect program files. These viruses normally infect executable code, such as .com and .exe files. The can infect other files when an infected program is run from floppy, hard drive, or from the network. Many of these viruses are memory resident. After memory becomes infected, any noninfected executable that runs becomes infected. Examples of known file infector viruses include Jerusalem and Cascade.
* Macro viruses these types of viruses infect data files. They are the most common and have cost corporations the most money and time trying to repair. With the advent of Visual Basic in Microsoft's Office 97, a macro virus can be written that not only infects data files, but also can infect other files as well. Macro viruses infect Microsoft Office Word, Excel, PowerPoint and Access files. Newer strains are now turning up in other programs as well. All of these viruses use another program's internal programming language, which was created to allow users to automate certain tasks within that program. Because of the ease with which these viruses can be created, there are now thousands of them in circulation. Examples of macro viruses include W97M.Melissa, WM.NiceDay and W97M.Groov.

5.) Give three examples of inadequate passwords and explain why each would be a poor choice to protect a system from unauthorized users.
* One of the best ways to protect information or physical property is to ensure that only authorized people have access to it. Verifying that someone is the person they claim to be is the next step, and this authentication process is even more important, and more difficult, in the cyber world. Passwords are the most common means of authentication, but if you don't choose good passwords or keep them confidential, they're almost as ineffective as not having any password at all. Many systems and services have been successfully broken into due to the use of insecure and inadequate passwords, and some viruses and worms have exploited systems by guessing weak passwords.


Sources: http://expertanswercenter.techtarget.com/eac/knowledgebaseAnswer/0,295199,sid63_gci981843,00.html
http://en.wikipedia.org/wiki/Windows_NT
http://www.us-cert.gov/cas/tips/ST04-002.html

No comments: