All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
systems analysis and design
Questions and Answers of
Systems Analysis And Design
a) What is a honeypot? b) How can honeypots help companies detect attackers? c) Could a honeypot attract unwanted attention from attackers?
a) What do business continuity plans specify? b) Distinguish between business continuity plans and IT disaster recovery plans.
a) What four protections can firms provide for people during an emergency? b) Why is accounting for all personnel important? (The answer is not in the text.) c) Why does human cognition in crises
a) List the four steps in business process analysis? b) Explain why each is important?
a) Why are business continuity plans more difficult to test than incident response plans? b) Why is frequent plan updating important? c) Why must companies update contact information even more
a) What is IT disaster recovery? b) Why is it a business concern?
a) What are the main alternatives for backup sites? b) What is the strength of each? c) What problem or problems does each raise? d) Why is CDP necessary?
a) What are the four severity levels of incidents? b) What is the purpose of a CSIRT? c) From what parts of the firm do its members come? d) What is business continuity? e) Who should head the
What three things should a firm do about disaster recovery planning for office PCs?
a) What must be done to restore data at a backup site via tapes? b) How does this change if a firm uses continuous data protection?
a) Why is speed of response important? b) Why is accuracy of response important? c) Define incident response in terms of planning. d) Why are rehearsals important? e) What is a walkthrough or
a) Distinguish between detection and analysis? b) Why is good analysis important for the later stages of handling an attack? c) What is escalation?
a) What is containment? b) Why is disconnection undesirable? c) What is black holing?
a) What are the three major recovery options? b) For what two reasons is repair during continuing operation good? c) Why may it not work? d) Why is the restoration of data files from backup tapes
a) Is it easier to punish employees or to prosecute outside attackers? b) Why do companies often not prosecute attackers? c) What is forensics evidence? Contrast what cybercrimes the FBI and local
You are advising a small company. a) Would you recommend using a firewall? Explain. b) Would you recommend using antivirus filtering? Explain. c) Would you recommend an intrusion detection system?
When IDSs generate alerts, it can send them to a console in the security center, to a mobile phone, or via e-mail. Discuss the pros and cons of each?
Examine the integrated log file shown in Figure 10-19. a) Identify the stages in this apparent attack. b) For each stage, describe what the attacker seems to be doing? c) Decide whether the actions
A firm is trying to decide whether to place its backup center in the same city or in a distant city. List the pros and cons of each choice?
To get out of taking exams, students occasionally phone in bomb threats just before the exam. Create a plan to deal with such attacks. This should take one single-spaced page. It should be written by
After you restore files following an incident, users complain that some of their data files are missing. What might have happened?
What impact would more open ports have on the ability of your honeypot to attract hackers?
Can hackers tell that you have a honeypot running?
Do they have honeypots for spammers to keep them from harvesting e-mails from your webpages?
Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior?
Would this work on your cell phone if it were connected to your computer?
What effect does the "condition" of the file have on its ability to be recovered?
What other recovery options does Recuva come with?
Why are merchants usually responsible for merchandise purchased with stolen credit cards?
Which forms of fraud are the most common? Why?
Which forms of fraud are the most costly? Why?
Why does a perpetrator's level of authority in the organization, or time working for the organization, affect the average amount of money stolen?
Why are workers in accounting, operations, sales, executive/upper management, customer service, and purchasing functions most likely to commit fraud?
(a) What is an octet? (b) What is a host? (c) Is a home PC connected to the Internet a host? (d) Distinguish between the terms internet and Internet.
(a) Which organization creates Internet standards? (b) What is the name of its standards architecture? (c) What is an RFC? (d) How can you tell which RFCs are Internet Official Protocol Standards?
(a) What two standards agencies govern OSI? (Just give their acronyms.) (b) Distinguish between OSI and ISO. (c) How many layers does the OSI architecture have? (d) Which of these layers are similar
(a) What architecture do most firms actually use? (b) In the hybrid TCP/IP-OSI architecture, which layers come from OSI? (d) From what standards architecture do application layer standards come?
(a) Distinguish between physical links and data links. (b) What advantage of optical fiber over UTP was listed in the text? (c) Why is spread-spectrum transmission used in wireless LANs? (d) Why are
(a) If the header length field's value is 6 and the total length field's value is 50, how long is the data field? Show your work. (b) What is the general function of the second row in the IPv4
(a) How long are traditional IP addresses? (b) What are the three parts of an IP address? (c) Why are masks needed? (d) What is the main advantage of IPv6?
(a) In what sense is IPsec a general protection strategy for all internet, transport, and application protocols? (b) Does IPsec work with IPv4, IPv6, or both? (c) Compare IPsec transport mode and
(a) What are the functions of an access router? Explain each function in one sentence. (b) Describe the technology of 4-pair UTP wiring. (c) What is an Internet access line? (d) What is a broadband
(a) Describe a TCP session opening. (b) Describe a normal TCP closing. (c) Describe an abrupt TCP closing. (d) Describe how reliability is implemented in TCP. (e) Describe a TCP half-open DoS
(a) What is the purpose of the TCP window field? (b) How does the window field automatically control congestion? (c) Does TCP use options frequently?
(a) A packet has the source socket 1.2.3.4:47 and the destination socket 10.18.45.123:4400. Is the source host a client or a server? Explain. (b) Is the destination host a client or a server?
(a) What is the attraction of UDP? (b) What kinds of applications specify the use of UDP at the transport layer? (c) Why is UDP more dangerous than TCP?
(a) What is the TCP/IP internet layer supervisory protocol? (b) Describe ping. (c) Describe ICMP error messages. (d) What information does ping give an attacker? (e) What information does tracert
(a) What is a local area network? (b) What is the customer premises? (c) Distinguish between workgroup switches and core switches. (d) Why is UTP dangerous? (e) Why is 802.1X needed?
(a) Why would a host contact a DNS server? (b) If a local DNS server does not know the IP address for a host name, what will it do? (c) What kind of organization must maintain one or more DNS
(a) What kind of IP addresses do servers get? (b) Why are DHCP servers used? (c) Will a PC get the same dynamic IP address each time it uses the Internet? (d) Both DHCP servers and DNS servers
(a) Why are dynamic routing protocols needed? (b) What is the main TCP/IP interior dynamic routing protocol for large networks? (c) What is the main TCP/IP exterior dynamic routing protocol? (d)
(a) What is the purpose of SNMP? (b) Distinguish between the SNMP GET and SET commands. (c) Why do many organizations disable the SET command?
(a) Why are there usually two protocols for each application? (b) In e-mail, distinguish between SNMP and POP. (c) Why are Telnet and FTP dangerous? (d) What secure protocol can be used instead of
(a) Distinguish between LANs and WANs. (b) Why do companies use carriers for WAN transmission? (c) What two WAN technologies are illustrated in the figure (Figure A-4)? (d) Why is carrier WAN traffic
(a) Which organization created the Internet? (b) What is the function of a router? (c) Distinguish between frames and packets. (d) If two hosts are separated by five networks, how many packets will
List the four security problems with protocols. Write one sentence describing each.
(a) What are the three core standards layers? (b) Distinguish between the single-network core layer and the internet core layer. (c) At what core layer do you find LAN standards? (d) At what core
Why does your computer send so many packets? Why not send just one really big packet?
Figure 1.22 gives the relevant chip statistics that influence the cost of several current chips. In the next few exercises, you will be exploring the trade-offs involved between the AMD Opteron, a
Imagine that the government, to cut costs, is going to build a supercomputer out of the cheap processor system in Exercise 1.9 rather than a special purpose reliable system. What is the MTTF for a
In a server farm such as that used by Amazon or the Gap, a single failure does not cause the whole system to crash. Instead, it will reduce the number of requests that can be satisfied at any one
Make the following calculations on the raw data in order to explore how different measures color the conclusions one can make. (Doing these exercises will be much easier using a spreadsheet.)a.
Imagine that your company is trying to decide between a single-processor system and a dual-processor system. Figure 1.26 gives the performance on two sets of benchmarks-a memory benchmark and a
Your company has just bought a new dual Pentium processor, and you have been tasked with optimizing your software for this processor. You will run two applications on this dual Pentium, but the
You are trying to figure out whether to build a new fabrication facility for your IBM Power5 chips. It costs $1 billion to build a new fabrication facility. The benefit of the new fabrication is that
Your colleague at Sun suggests that, since the yield is so poor, it might make sense to sell two sets of chips, one with 8 working processors and one with 6 working processors. We will solve this
Figure 1.23 presents the power consumption of several computer system components. In this exercise, we will explore how the hard drive affects power consumption for the system. a. Assuming the
One critical factor in powering a server farm is cooling. If heat is not removed from the computer efficiently, the fans will blow hot air back onto the computer, not cold air. We will look at how
Figure 1.24 gives a comparison of power and performance for several benchmarks comparing two servers: Sun Fire T2000 (which uses Niagara) and IBM x346 (using Intel Xeon processors). a. Calculate the
Your company's internal studies show that a single-core system is sufficient for the demand on your processing power. You are exploring, however, whether you could save power by using two cores. a.
On August 24, 2005, three Web sites managed by the Gap-Gap.com, OldNavy.com, and BananaRepublic.com-were taken down for improvements [AP 2005]. These sites were virtually inaccessible for the next
The main reliability measure is MTTF. We will now look at different systems and how design decisions affect their reliability. Refer to Figure 1.25 for company statistics. a. We have a single
What would be the baseline performance (in cycles, per loop iteration) of the code sequence in Figure 2.35 if no new instruction execution could be initiated until the previous instruction execution
VLIW designers have a few basic choices to make regarding architectural rules for register use. Suppose a VLIW is designed with self-draining execution pipelines: once an operation is initiated, its
Assume a five-stage single-pipeline microarchitecture (fetch, decode, execute, memory, write back) and the code in Figure 2.41. All ops are 1 cycle except LW and SW, which are 1 + 2 cycles, and
Let's consider what dynamic scheduling might achieve here. Assume a microarchitecture as shown in Figure 2.42. Assume that the ALUs can do all arithmetic ops (MULTD, DIVD, ADDD, ADDI, SUB) and
Think about what latency numbers really mean-they indicate the number of cycles a given function requires to produce its output, nothing more. If the overall pipeline stalls for the latency cycles of
Consider a multiple-issue design. Suppose you have two execution pipelines, each capable of beginning execution of one instruction per cycle, and enough fetch/decode bandwidth in the front end so
In the multiple-issue design of Exercise 2.3, you may have recognized some subtle issues. Even though the two pipelines have the exact same instruction repertoire, they are not identical nor
Reorder the instructions to improve performance of the code in Figure 2.35. Assume the two-pipe machine in Exercise 2.3, and that the out-of-order completion issues of Exercise 2.4 have been dealt
Every cycle that does not initiate a new operation in a pipe is a lost opportunity, in the sense that your hardware is not "living up to its potential." a. In your reordered code from Exercise 2.5,
Computers spend most of their time in loops, so multiple loop iterations are great places to speculatively find more work to keep CPU resources busy. Nothing is ever easy, though; the compiler
Exercise 2.7 explored simple register renaming: when the hardware register renamer sees a source register, it substitutes the destination T register of the last instruction to have targeted that
If you ever get confused about what a register renamer has to do, go back to the assembly code you're executing, and ask yourself what has to happen for the right result to be obtained. For example,
This part of our case study will focus on the amount of instruction-level parallelism available to the run time hardware scheduler under the most favorable execution scenarios (the ideal case).
Let us now consider less favorable scenarios for extraction of instruction-level parallelism by a run-time hardware scheduler in the hash table code in Figure 3.14 (the general case). Suppose that
For each part of this exercise, assume the initial cache and memory state as illustrated in Figure 4.37. Each part of this exercise specifies a sequence of one or more CPU operations of the form:P#:
The switched interconnect increases the performance of a snooping cache-coherent multiprocessor by allowing multiple requests to be overlapped. Because the controllers and the networks are pipelined,
The switched snooping protocol of Figure 4.40 assumes that memory "knows" whether a processor node is in state Modified and thus will respond with data. Real systems implement this in one of two
Exercise 4.3 asks you to add the Owned state to the simple MSI snooping protocol. Repeat the question, but with the switched snooping protocol above.
Exercise 4.5 asks you to add the Exclusive state to the simple MSI snooping protocol. Discuss why this is much more difficult to do with the switched snooping protocol. Give an example of the kinds
Sequential consistency (SC) requires that all reads and writes appear to have executed in some total order. This may require the processor to stall in certain cases before committing a read or write
The switched snooping protocol above supports sequential consistency in part by making sure that reads are not performed while another node has a writeable block and writes are not performed while
For each part of this exercise, assume the initial cache and memory state in Figure 4.42. Each part of this exercise specifies a sequence of one or more CPU operations of the form: P#: [
Directory protocols are more scalable than snooping protocols because they send explicit request and invalidate messages to those nodes that have copies of a block, while snooping protocols broadcast
Exercise 4.3 asks you to add the Owned state to the simple MSI snooping protocol. Repeat the question, but with the simple directory protocol above.
Exercise 4.5 asks you to add the Exclusive state to the simple MSI snooping protocol. Discuss why this is much more difficult to do with the simple directory protocol. Give an example of the kinds of
The performance of a snooping cache-coherent multiprocessor depends on many detailed implementation issues that determine how quickly a cache responds with data in an exclusive or M state block. In
Consider the advanced directory protocol described above and the cache contents from Figure 4.20. What are the sequence of transient states that the affected cache blocks move through in each of the
Consider the advanced directory protocol described above and the cache contents from Figure 4.42. What are the sequence of transient states that the affected cache blocks move through in each of the
Showing 3100 - 3200
of 3387
First
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34