Networks and Communication
Florida Tech | MGT 5157 | DISCUSSION 7
• Describe network and host-based firewalls • Identify examples of firewall rules • Examine the strengths and weaknesses of firewalls Instructions Identify requirements that should be considered when determining the locations and features of firewalls. What are some important steps to take to keep firewalls effective? What are some of...
Read More
Florida Tech | MGT 5157 | DISCUSSION 6
• Evaluate the applicability of network defense methods to prevalent attack types Instructions Read the following: • Security and Privacy Issues With Internet of Things (IoT)Links to an external site. • People Are Really Worried About IoT Data Privacy and Security -- and They Should BeLinks to an external site....
Read More
Florida Tech | MGT 5157 | DISCUSSION 5
• Analyze the needs for secure DNS control mechanisms Instructions What is the market for DNS control? Who are the big players in managing domain names? Can domain names be exploited?
Read More
Florida Tech | MGT 5157 | DISCUSSION 3
• Explain MAC addressing • Understand media-access control • Describe network addressing • Create an addressing structure for a multidepartment business • Examine the different methods of routing table generation Instructions Routers determine the path to a network using routing tables which list known networks. Routing tables are populated in...
Read More
Florida Tech | MGT 5157 | DISCUSSION 2
• Explain the fundamentals of network capacity and delay Instructions What is the reason behind packet loss? What can protocols do to limit packet loss? Are there tools available for providers and consumers that identify the source of packet loss?
Read More
Florida Tech | MGT 5157 | DISCUSSION 1
• Be conversant with common connectivity terms Instructions Read the article The Next Generation Functionality for the Local Area Network (LAN)Links to an external site.. What are some of the major differences in network traffic types that the Internet of Things devices have generated compared to traditional personal computer connectivity?
Read More
Florida Tech | MGT 5157 | ASSIGNMENT 5
• Differentiate between common network attacks and how they work, including o Denial-of-service attacks o Distributed denial-of-service attacks o Host-based attacks • Evaluate the applicability of network defense methods to prevalent attack types Instructions Answer each of the questions below with a few sentences. Be brief, but fully explain your...
Read More
Florida Tech | MGT 5157 | ASSIGNMENT 4
• Explain the ideas and concepts behind domain name services Instructions Define and provide examples in questions 1 and 2. Answer the associated questions in 3, 4 and 5. This assignment has 5 questions worth 10 points each, as noted. 1. Define the following and provide an example: a. Root...
Read More
Florida Tech | MGT 5157 | ASSIGNMENT 3
• Explain MAC addressing • Understand medium-access control • Describe network addressing Instructions For each of the true/false or multiple-choice questions below, choose one of the options and explain your answer. For the others, provide an explanation. 10 points will be earned for each question. 1. The link layer encapsulates...
Read More
Florida Tech | MGT 5157 | ASSIGNMENT 2
• Explain what modern computer networks are and the general principles behind data communications • Incorporate common connectivity terms • Distinguish among different types of switched networks Instructions For each of the multiple-choice questions below, choose one of the options and explain your answer (10 points each). For the others,...
Read More
Florida Tech | MGT 5157 | ASSIGNMENT 1
• Explain what modern computer networks are and the general principles behind data communications • Incorporate common connectivity terms • Distinguish among different types of switched networks Instructions For each of the multiple-choice questions below, choose one of the options and explain your answer. For the others, provide an explanation....
Read More