What is the difference between war driving and war chalking


1- Define cloud computing?

2- What differentiate a rule based firewall from application aware firewall or next generation firewall?

3- Explain the difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS)?

4- T/F Cloud computing is less secure . explain your reasoning to the above question?

5- What are some of the reasons that would make an organization opt for a Hybrid cloud instead of pure public or private cloud.

6- What do you get from a cloud provider when you sing up for an infrastructure as a service (laaS) cloud computing model?

* operating system.

7- Using illustration explain the meaning of single sing on (SSO)?

8- 1- Define in details sensitivity labels as used in a secure system that use mandatory access control (MAC) for access control?

2- What is the difference between War Driving and War chalking?

3- Explain in detail how the DNS work when a new device is added to domain and the user need to access a new external website. This will require clear demonstration and explanation of how various components of DNS work including the role of the DNS cache. Host file TLD.
Local DNS est)?

4- Define the concept of least privilege as it relates to access control?

5- use illustration to describe the following components of a Blue tooth network topology?

• Master/slave.
• Piconet .
• Scatternet
• Actine slave
• Parked slave

6- what is the difference between open ID and open Auth( oauth)?

9- Switch /2
HUP/1
IP/4
TCP/4
FTP/4
UDP/4
HTTP/7

10- Use illustration to describe how a network proxy work?

11- What do you get from a cloud provider when you sing up for a platform as a service (Paas) cloud computing model?

• Custom Application
• Storage
• Hardware
• Operating.

12- In access control which one of the following falls in the category of something you are?

• Password
• Token
• Cellphone
• Fingerprint.

13- What is the difference between bluejacking and Bluesnarfine Bluetooth attack?

14- In wireless network what does SSID stand for?

15- An unauthorized wireless Access point plugged in a corporate network is known as?

• Rogue Access point.
• Evil Twin
• Malicious wireless point (MWP)
• Malicious Access point (MAP)

16- T/F MAC address Filtering is a proven way of securing wireless network?

17- T/f Disabling wireless SSID keep your network hidden hence protecting your wireless network ?

18- In wireless network what dose WEp stand for?

19- List 2 security setup that can help secure mobile devices?

20- Define the following Access control Terminology?

• Object:
• Subject

21- T/F in Discretionary access control model (DAC) the system's owner set Access rights and permissions?

22- What is the difference between separation of duties and Job rotation? Why is each important?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What is the difference between war driving and war chalking
Reference No:- TGS01400114

Expected delivery within 24 Hours