What is the name given to the security attack when an opponent prevents messages from reaching a destination? Denial of service  Masquerading Modification of messages Eavesdropping

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Deluxe Bath Controller (This scenario is used by questions 14 and 15.)

At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath.


 

  1. What is the name given to the security attack when an opponent prevents messages from reaching a destination?
  1. Denial of service 
  2. Masquerading
  3. Modification of messages
  4. Eavesdropping

 

  1. Which of these is the highest-level part of the directory structure on Linux?
  1. Directory
  2. Topmost Directory
  3. File Allocation Table
  4. Superblock



  1. Which security goal aims to protect information from disclosure?
  1. Integrity
  2. Confidentiality 
  3. Authenticity
  4. Accountability



  1. What does a network switch do?
  1. It broadcasts messages to all the computers that are connected to it
  2. It job is to disable part of the network
  3. It collects all the network cables in one place
  4. Routes a message to its destination computer/network only



  1. Why don't adjacent base stations interfere with each other?
  1. They are placed far apart
  2. They use different frequencies
  3. They use different encoding
  4. People use different mobile phones



  1. What is the benefit of having a LAN?
  1. You can surf the world-wide web
  2. Share resources 
  3. Everybody has one
  4. It is cheaper than buying extra computers



  1. Set of Rules that govern the data communication and networks are:
  1. Standards
  2. IP Addresses
  3. MAC addresses
  4. Protocols 

 

  1. Operating System is 
  1. Application Software
  2. Computer Hardware
  3. System Software 
  4. File Server



  1. Variable which is used to control access by multiple processes in a common resource in an operating system is 
  1. Semaphore 
  2. Shell
  3. Kernel
  4. User Interface



  1. In a computer network, when a performing task is divided among the computers, the phenomenon is called   
  1. Distributed Systems
  2. Distributed Memory
  3. Distributed Processing 
  4. Multitasking



Тap Valve
Overflow
Sensor
Einite State Diagram: Deluxe Bath Controller
Y
Finite State Code: Deluxe Bath Controller
A State
B State
C State
Entry Code
Plug Open
Entry Code
Turn Tap On
Entry Code
X Event Code
Y Event Code
Enter State (A)
X Event Code
Enter State (B)
X Event Code
Enter State (C)
Z Event Code
Y Event Code
Z Event Code
Y Event Code
Enter State (A)
Exit Code
Exit Code
|Z Event Code
Enter State (C)
Plug Closed
Exit Code
Turn Tap Off
Transcribed Image Text:Тap Valve Overflow Sensor Einite State Diagram: Deluxe Bath Controller Y Finite State Code: Deluxe Bath Controller A State B State C State Entry Code Plug Open Entry Code Turn Tap On Entry Code X Event Code Y Event Code Enter State (A) X Event Code Enter State (B) X Event Code Enter State (C) Z Event Code Y Event Code Z Event Code Y Event Code Enter State (A) Exit Code Exit Code |Z Event Code Enter State (C) Plug Closed Exit Code Turn Tap Off
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY