GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Question Set 4 – 4.4 The list below presents the procedural…

Question Set 4 – 4.4 The list below presents the procedural steps of FNN. Which of the answer options presents their correct order? STEP A: Input the first observation of your dataset in the input layer, each feature in one input node. STEP B:Compare the predicted result to the actual result. Measure the generated error. STEP C: Forward-propagation: from left to right, the neurons are activated in a way that the impact of each neuron’s activation is limited by the weights. Propagate the activations until getting the predicted result y. STEP D: Randomly initialize the network, set weights to small numbers close to 0 (but not 0). STEP E: Repeat previous steps and update the weights after each observation. Or, repeat previous steps but update the weights only after a batch of observations (Batch Learning). STEP F:Back-Propagation: From right to left, the error is back-propagated. Update the weights according to how much they are responsible for the error. The learning rate decides by how much we update the weights.

Read Details

Question Set 3 – 3.7 You can also use the attack countermeas…

Question Set 3 – 3.7 You can also use the attack countermeasure tree (ACT) to model the attack scenarios. For example, Figure 3.4 presents a BGP attack scenario. In the figure, the money value ($) are used to represent how much effort an attacker needs to expend to deploy the attack. Referring to Figure 3.4 and if the attacker’s budget constraint is $2900 (so the sum of the effort spent by the attacker cannot exceed $2900 ), which attack scenarios are possible? (select all that apply) Figure 3.4. Attack Countermeasure Tree Flowchart depicting alternative methods for resetting a BGP session with decision points, actions, and associated costs ranging from 800 to 4000.  

Read Details

Given the following Circle class code, use the provided UML…

Given the following Circle class code, use the provided UML to write the code of the Cylinder class which is a subclass of the Circle class.   ————————————————————————————————————-   UML Cylinder  – height: double + setHeight(h: double): void + getHeight( ) : double + toString( ) : String +Cylinder( ) +Cylinder(c: String, r: double, h: double)  

Read Details

Question Set 1 – Question 1.1 Suppose you are an IT staff me…

Question Set 1 – Question 1.1 Suppose you are an IT staff member and it is your organization’s network that is shown to the left side of the Internet in Figure 1.1.  You have a private network 192.168.0.0/24 and this private network is behind the gateway G. I1-I6 represent network interfaces of host/server/gateway/router. If G is the one that connects your organization to the public Internet, you need to assign a public IP address from your local ISP.  Which of the following IP addresses that you may get from your ISP should be assigned on your gateway G’s interface I3 that connects to the Internet? Figure 1.1 Network Setup  Diagram showing a network configuration with labeled components. From left to right: interface I1, gateway G, Internet cloud, interface I5, and server/router I6.  

Read Details

Question Set 1 – 1.13 If you also set up NAT on the interior…

Question Set 1 – 1.13 If you also set up NAT on the interior router, the traffic initiated from the host to the web server (202.10.19.132) on the public domain needs to traverse two NAT (double NAT).  Assuming that the default firewall policy is DROP, and IPs are shown in the table in Q1.11. Which of the following iptables NAT configurations is correct? (Only consider one way traffic going from the host to internet.) Figure 1.3 System with DMZ Network diagram for a system with DMZ including two servers connected to an interior router, a webserver in the DMZ between two routers, and a public-facing server connected to the external router. A monitor is also present in the diagram.   Node-to-IP Mapping in Network Setup Node IP Host 192.168.0.10 Interior Router 192.168.0.30 Exterior Router 172.16.0.10 Webserver 172.16.0.20 DB 192.168.0.20  

Read Details

Q​uestion Set 2 – Question 2.9 Refer to Figure 2.3, which sh…

Q​uestion Set 2 – Question 2.9 Refer to Figure 2.3, which shows the OVS function modules. Which of the following statements are correct? (select all that apply) Figure 2.3. OVS Function Models Diagram showing Open vSwitch software architecture, including components in user space like “ovsdb-server” and “ovs-switchd,” and kernel modules like “openvswitch_mod.ko.” Connections via JSON RPC, OpenFlow, and netlink are displayed, along with a representation of a data flow pipeline.

Read Details

Q​uestion Set 1 – 1.16 Using snort, you need to configure mo…

Q​uestion Set 1 – 1.16 Using snort, you need to configure more rule sets to detect attacks targeting various network services. Which of the following statements are correct? (select all that apply)  

Read Details

Q​uestion Set 2 – Question 2.14 RFC 8300, Network Service He…

Q​uestion Set 2 – Question 2.14 RFC 8300, Network Service Header (NSH), specified how to enable NSH to allow the network to become service-aware. Figure 2.6 below presents an example of the NSH encapsulation. Figure 2.6. Example NSH Encapsulation Diagram illustrating the components of a VXLAN encapsulated network packet with a Network Services Header containing NSH Base Header, Service Path/Index, and Optional Metadata, flanked by headers and payload in a stacked arrangement.

Read Details

Question Set 2 – Question 2.6 Figure 2.2 below is provided f…

Question Set 2 – Question 2.6 Figure 2.2 below is provided for general reference. Which of the following options are recognized as key technologies adopted by SDN? (select all that apply)   Figure 2.2 – Layered Network Diagram  Illustrative network diagram showing a layered structure with “App” icons at the top, connected to “Network Virtualization” and “Network Operating System” layers, which in turn are connected to “Simple Packet Processing Forwarding” components at the bottom.

Read Details

Q​uestion Set 1 – Q​uestion 1.8 Keep the cryptographic featu…

Q​uestion Set 1 – Q​uestion 1.8 Keep the cryptographic features of IPSec in mind. IPSec uses certificates to set up initial trust between communicating parties.  Which of the following statements are correct? (select all that apply)

Read Details

Posts pagination

Newer posts 1 … 37,043 37,044 37,045 37,046 37,047 … 71,018 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top