Submission guidelines: • Deadline for submission on Moodle is by 5pm Friday 11 September, 2020. • You must submit a word document that provides answers to the questions given below. Your answers must...

1 answer below »
Submission guidelines: • Deadline for submission on Moodle is by 5pm Friday 11 September, 2020. • You must submit a word document that provides answers to the questions given below. Your answers must be concise and brief. • You can use online material present on the Internet in relevant research articles/books, however, you have to cite them in proper APA or Harvard format. • Remember not to copy/paste anything directly from above mentioned resources, you should provide answer to the questions in your own words. • Avoid any sort of plagiarism (Do not copy anything from your class fellows). • This tutorial carries 7.5% weightage. Question 1: What is ‘Gratuitous ARP’? Why is it needed? [1.5 + 1.5 = 3 Marks] Question 2: Differentiate between ‘Hubs’ and ‘Switches’? [3 Marks] Question 3: What is MAC address flooding attack? Briefly explain any one method to prevent this attack [1.5 + 1.5 = 3 Marks] Question 4: Explain any three disadvantages of ‘Hub and Spoke’ WAN topology [3 Marks] Question 5: What is DHCP Spoofing attack? Briefly explain any one method to prevent this attack


BISY2002 Information Systems Networking Essentials Tutorial 2 Total Marks = 15 Submission guidelines: • Deadline for submission on Moodle is by 5pm Friday 11 September, 2020. • You must submit a word document that provides answers to the questions given below. Your answers must be concise and brief. • You can use online material present on the Internet in relevant research articles/books, however, you have to cite them in proper APA or Harvard format. • Remember not to copy/paste anything directly from above mentioned resources, you should provide answer to the questions in your own words. • Avoid any sort of plagiarism (Do not copy anything from your class fellows). • This tutorial carries 7.5% weightage. Question 1: What is ‘Gratuitous ARP’? Why is it needed? [1.5 + 1.5 = 3 Marks] Question 2: Differentiate between ‘Hubs’ and ‘Switches’? [3 Marks] Question 3: What is MAC address flooding attack? Briefly explain any one method to prevent this attack [1.5 + 1.5 = 3 Marks] Question 4: Explain any three disadvantages of ‘Hub and Spoke’ WAN topology [3 Marks] Question 5: What is DHCP Spoofing attack? Briefly explain any one method to prevent this attack [1.5 + 1.5 = 3 Marks]
Answered Same DaySep 03, 2021BISY2002

Answer To: Submission guidelines: • Deadline for submission on Moodle is by 5pm Friday 11 September, 2020. •...

Divya answered on Sep 06 2021
140 Votes
Ans-1 It is a feedback which was not incited by an ARP appeal. It is sent as a transmission, as a route for a hub to report or redevelop its Internet Protocol to Media Access Control planning to the whole system.
Unnecessary ARPs are valuable for four reasons:
1. Recognize Internet Protocol clashes.
2. Aid the refreshing of devices ARP charts.
3. Illuminate control regarding the Media Access Control label of the devices on a provided control port.
Ans-2
    S.No
    BASIC
    HUB
    SWITCH
    1.
    Surface
    It works on physical surface
    It works on connecting facts surface.
    2.
    Dock
    It has four docks
    It can range from 24-28 docks.
    3.
    Communication fashion
    Half duplex communication fashion is used.
    Full duplex communication fashion is used.
    4.
    Data detachment
    Data detachment is not provided
    Data detachment is provided.
Ans- 3 It is widely recognized system assaults. Dissimilar to further web assaults, it isn't a strategy for assaulting main device in the system; however it’s the technique for assaulting the system control. Nonetheless, the survivor of the assault is a main PC in the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here