You are on page 1of 1

TUTORIAL 8

1. Which is more efficient, circuit switching or virtual circuit switching?


Why?

2. A message is broken up into three pieces. Discuss the transmission of


the packets using datagram approach to packet switching.

3. Compare the datagram approach with a virtual circuit approach of a


packet switching network.

4. Discuss the approach taken in setting up a firewall to an organization.

5. Define social engineering attack. Describe a social engineering attack


you could use to obtain a user’s password.

6. Do firewall rules need to be symmetric? That is does the firewall have


to block a particular type of traffic that is coming from both inbound
and outbound? Justify your answer.

7. Explain the benefits of client/server architecture.

You might also like