الفراشة أصبح فتيات Ftayat.com : يتم تحديث الموقع الآن ولذلك تم غلق النشر والمشاركات لحين الانتهاء من اتمام التحديث ترقبوا التحديث الجديد مزايا عديدة وخيارات تفاعلية سهلة وسريعه.
فتيات اكبر موقع وتطبيق نسائي في الخليج والوطن العربي يغطي كافة المجالات و المواضيع النسائية مثل الازياء وصفات الطبخ و الديكور و انظمة الحمية و الدايت و المكياج و العناية بالشعر والبشرة وكل ما يتعلق بصحة المرأة.
no_way
08-04-2022 - 01:06 am
  1. b) What are MPLS’s attractions

  2. Answer:

  3. Answer:

  4. Answer:


السلام عليكم ورحمة الله وبركاته
انا عندى اساله واجابتهم بس انا ابغى اعيد صياغة الاجابه لانها نموذجيه في المطلوب منى انى اكتبها بصياغتى انا موصياغه الكتاب
فالله يسعدها منى الي بتساعدني في ها الشي الاجابه مو جوده بس ابغى تكون بصيغه ثانيه غير صياغه الكتاب
السوال الاول
List and describe the physical components used with ADSL technology.
Answer:
At the customer's premises, there must be a splitter in each telephone wall jack. One subjack is for telephones, the other for a NIC.
Transmission takes place over the existing single pair of voice-grade UTP that already runs to the customer premises.
At the telephone company's end office, there is a DSL access multiplexer (DSLAM). This connects to the telephone network for voice traffic and to a data network for data traffic.
=====================
السوال الثاني
What is a remote access VPN?
Answer:
A remote access VPN is a VPN used to connect an individual user to a corporate site.
====================
السوال الثالث
a) How does Multiprotocol Label Switching (MPLS) work

b) What are MPLS’s attractions

Answer:

a) Multiprotocol label switching (MPLS) works by adding a label before the IP packet, and label-switching routers base forwarding decisions on the label’s value, which they look up in a single row in the label-switching table.
b) The main attraction of MPLS is that it reduces routing costs.
MPLS’s other attractions are that it can provide quality of service for voice and other time-critical traffic flows, as well as doing load balancing across different routes for efficiency.
=======================
السوال الرابع
a) What is hacking?
b) Why do hackers send probe packets into networks?
c) What steps do hackers usually take after a break-in?

Answer:

a) Hacking is using a computer resource without authorization or in excess of authorization.
b) Hackers send probe packets into the firm’s network because probe packets can elicit responses that reveal information about the firm’s general network design and about its individual computers—including their operating systems.
c) After a break-in, a hacker usually tries to erase the operating system’s log files so that the computer’s rightful owner cannot trace how the attacker broke in or gather evidence to find and prosecute the attacker. The attacker will also often create a backdoor and then do damage.
====================
السوال الخامس
a) What is authentication?
b) Distinguish between the applicant and the verifier.
c) What are credentials?
Answer:
a) Authentication is requiring someone requesting to use a resource to prove his or her identity.
b) The applicant is the user trying to prove his or her identity.
The verifier is the party requiring the applicant to prove his or her identity.
c) Credentials are proof of identity that the applicant provides to the verifier.
============
السوال السادس
Describe the difference between symmetric key encryption and public key encryption for confidentiality.

Answer:

In symmetric key encryption, the two sides use the same key to encrypt message to each other and to decrypt incoming messages.
In public key encryption, each side has a public key and a private key, so there are four keys in total. The sender encrypts messages with the receiver’s public key. The receiver, in turn, decrypts incoming messages with the receiver’s own private key. Only the receiver knows his or her own private key, so the receiver can decrypt the message.
=================
الله يوفق من تساعدني


التعليقات (9)
Fatimah de el corazon
Fatimah de el corazon
List and describe the physical components used with ADSL technology
Write in deteals what you know about the physical components used with ADSL technology.
.................................................. ..........................................
What is a remote access VPN
What is the difenition of a remote access VPN?

Fatimah de el corazon
Fatimah de el corazon
a) How does Multiprotocol Label Switching (MPLS) work?
What is the role of the Multiprotocol Label Switching (MPLS)?
Or
What is the employment of....

Fatimah de el corazon
Fatimah de el corazon
b) What are MPLS’s attractions
Give a simple meaing of .....

Fatimah de el corazon
Fatimah de el corazon
a) What is hacking?
What is the difenition of.....

Fatimah de el corazon
Fatimah de el corazon
b) Why do hackers send probe packets into networks?
?What are the fundamental reasons which make hackers send probe packets into networks

Fatimah de el corazon
Fatimah de el corazon
c) What steps do hackers usually take after a break-in
Are there any steps should be taken from hackers to save their self? List them.

Fatimah de el corazon
Fatimah de el corazon
a) What is authentication?
What does authentication mean?

Fatimah de el corazon
Fatimah de el corazon
c) What are credentials?
Write the complete difenition of credentials.

Fatimah de el corazon
Fatimah de el corazon
Describe the difference between symmetric key encryption and public key encryption for confidentiality
You can say:
What is the differene between ...........
or
Make a comparison between ....

عبارات يمكنك استخادمها في التاكسي ولما تسافرو برا
How to Write a Summary