Homework 3 problems and solutions

Homework 3 problems and solutions - Homework 3 Chapter 1...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Homework 3 Chapter 1 R.26) What is the difference between a virus, a worm, and a Trojan horse ?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
R.27) Describe how a botnet can be created, and how it can be used for a DDoS attack. R.28) Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.
Background image of page 2
Chapter 2 R.1) List five nonproprietary Internet applications and the application-layer protocols that they use. R.4) For a PS file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
R.11) Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather than on UDP? 2.1)
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/15/2010 for the course ECE 465 taught by Professor Paris,b during the Spring '08 term at George Mason.

Page1 / 7

Homework 3 problems and solutions - Homework 3 Chapter 1...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online