DISCUSSION QUESTIONS

  1. Research and evaluate computer organizations across modern computer architectures such as Mobile Devices, Tablets, and Cloud Infrastructure Services.  After conducting this research, answer the following questions:
  • How does the Von Neumann architecture influence modern computer organizations?
  • Compare and contrast Mobile Architectures, such as ARM with Cloud Architectures, such as x86.
  • Discuss how performance is optimized with Parallel Computing and Multiprocessing.
  1. Research and evaluate the use of logic gates within a digital system.  Based on your research, answer the following:
  • Define a logic gate and what benefit they provide to a digital system.
  • Choose three logic gates and discuss the following:
    o A description of the logic gate.
    o A review of the inputs, outputs, and function it provides.
    o An example of its application.
  1. Research data representation in modern computer systems.  Based on your research, answer the following:
  • Discuss the difference in machine code, assembly code, and high-level languages.
  • Discuss how data is represented across decimal, binary, and hexadecimal.
  • Discuss how a computer would convert the various data representation types

 

  1. Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following:
  • What were the most compelling topics learned in this course?
  • How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
  • What approaches could have yielded additional valuable information?
  • The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.

Discuss the following topics:

  • Define the history of assembly and current programming languages.

 

 

 

 

 

 

  1. Hackers are divided into two classes; black hat and white hat hackers.

White or grey hat hackers usually perform ethical hacking. These hackers will utilize many of the same techniques that black hat hackers will use, but instead of performing the tasks for nefarious activities, they are used to find the weaknesses or vulnerabilities in an information system and work with the system owner to correct or mitigate the situation. Security professionals need to start thinking like hackers to know, understand, and anticipate how and where attacks could originate. Complete the following:

  • Describe the difference between a black hat hacker and a white hat hacker.
  • Where does the process of ethical hacking fall within the spectrum of hackers?
  • Give 2 activities that would be considered white hat activities and 2 activities that would be considered black hat activities.
    • Support your choices.
  • Do you think that any of these activities could change in the future from white hat to black hat or vice versa?
  1. Social engineering plays a big part in a hacker’s methodology. Whether it is to find organizational information, gain unauthorized access, or guess at passwords, hackers utilize social engineering as a low-tech method for finding information. Complete the following:
  • Describe what social engineering is and how your organization may be susceptible to its effects.
  • How can organizations protect themselves from a social engineering attack?
  • Give 2 examples of social engineering attacks that you have seen or been subject to.
  1. After the footprinting tasks are completed, the attacker will have a good understanding about the security posture and very high-level network and server details. The next step that the attacker will perform is to scan and enumerate the systems. To help understand what scanning and enumeration are, provide your responses to the following:
  • Describe scanning and enumeration.
  • Discuss the pros and cons of 2 scanning and enumeration tools.
  • Explain how enumeration can be considered first contact.

 

  • Discuss the importance of having a signed agreement, and give the implications of conducting a pen test without one.
  • Many organizations employ intrusion detection systems (IDS) or even intrusion prevention systems (IPS). It is important to understand how these tools protect the organization.
  • Describe how footprinting the stages of an attack might not be detected by an IDS.
  • Recommend an IDS for your organization and include the pros and cons behind your recommendation.

 

  • What were the most compelling topics that you learned in this course?
  • How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
  • What approaches could have yielded additional valuable information?

 

All papers are written by ENL (US, UK, AUSTRALIA) writers with vast experience in the field. We perform a quality assessment on all orders before submitting them.

Do you have an urgent order?  We have more than enough writers who will ensure that your order is delivered on time. 

We provide plagiarism reports for all our custom written papers. All papers are written from scratch.

24/7 Customer Support

Contact us anytime, any day, via any means if you need any help. You can use the Live Chat, email, or our provided phone number anytime.

We will not disclose the nature of our services or any information you provide to a third party.

Assignment Help Services
Money-Back Guarantee

Get your money back if your paper is not delivered on time or if your instructions are not followed.

We Guarantee the Best Grades
Assignment Help Services