Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Give the full name of an application layer protocol that uses TCP as the transport layer protocol. (0-2 points) 2. State two advantages of

1. Give the full name of an application layer protocol that uses TCP as the transport layer protocol. (0-2 points) 2. State two advantages of Network Standards. (0-2 points) 3. State two advantages of using Software As a Service (SaaS), with respect to cloud computing. (0-2 points) 4. The default port number for SMTP is 25, 80, 110, or 143? (0-1 points) 5. Briefly describe two situations where you might use wireless LANs. (0-4 points) 6. Given the IPv4 address 192.168.1.12/28, what is its subnet mask? 255.255.255.255, 255.255.255.0, 255.255.255.240, 255.255.255.192, or 255.255.255.128 (0-1 points) 7. In the context of computer security, explain what is a denial of service attack. (0-4 points) 8. When Tom signs a message using RSA and sends it to Mary, which which key does he use for signing and why? Please explain this encryption process. Toms public key, Marys public key, Toms private key, or Marys private key (0-4 points)

Thank you very much, some choice question that i need explain.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing Fundamentals, Design, and Implementation

Authors: David M. Kroenke, David J. Auer

14th edition

133876705, 9781292107639, 1292107634, 978-0133876703

More Books

Students also viewed these Databases questions