How is a Canonical Name (CNAME) record used? * O It is used for reverse DNS lookups O It identifies the name server that's authoritative for the domain It functions as an alias for another record that allows you to refer to the same resource with different names O It contains the address of an e-mail server responsible for the domain
Q: Python pandas exersize Dataset url =…
A: Here is the python code for your pandas exersize. See below step for code. Program is written in…
Q: What is a privilege?
A: Privilege Privilege is defined as the delegation of authority for performing security relevant…
Q: Show and upload your SOLUTION. Include the starting address, ending address and limit. Code a…
A: Solution: Segments are interpreted differently in Protected Mode vs. Real Mode: Segment register…
Q: Give the process a name that enables you to copy files from specifically configured Internet servers…
A: GIVEN: Give the process a name that enables you to copy files from specifically configured…
Q: 5. You have decided to track user activity on your Windows Server 2019 FTP server by storing your…
A: According to the information given:- we have to choose the FTP log file to satisfy the mention…
Q: Question 16 HTTP is a stateless protocol. The term "stateless" in this context means: O It requires…
A: - As specified we have to discuss question 16 only. - In question 16 we have to specify the term…
Q: ype A resource records contain a. Mail Records b. IPv4 mappings c. Host Aliases d. IPv6 mappings
A: Resource records in DNS database are : Start of authority (SOA) Name server (NS) Pointer (PTR)…
Q: The DNS Start of Authority record gives information about the zone like administrator contact.…
A: Please find the answer below :
Q: What is the difference between Host aliasing and Mail Server aliasing? Also, explain how MX record…
A: Host aliasing The host aliasing can host the website with one hostname and can point to the other…
Q: You found that Security logs utilize a significant amount of diskspace on Server. Most of the…
A: You can set or disable the audit policy categories and subcategories on each Windows system on your…
Q: How to specify number of nodes and number of processes in batch script?
A: According to the question we need to provide the answer for how to specify number of nodes and…
Q: • Create Mini-Password Manager Write a simple code to create hash value of passwords Store the…
A: Please upvote. I am providing you the correct answer below. Please Please. SHA3-512 is…
Q: a) When using an Apache server, the directives and are forbidden in a directory access file. Why…
A: Directives within the configuration file might apply to the whole server, or they will be restricted…
Q: 1. Create a C++ ATM program that allows one to login as an administrator and as User. This program…
A: #include <fstream>#include <iostream>#include <limits>#include…
Q: estion:- DJ is a Junior salesforce in the Accenture and he is assigned the veloper Profile. senior…
A: Given:
Q: You manage an Azure subscription named Sub1. Sub1 is associated to an Azure Active Directory (Azure…
A: The question has been answered in step2
Q: Downloads 1491;NAME-Nuzhat lab O…
A:
Q: 6a) Which type of file is easiest to update? A) Sequential B) Hashed C) Indexed D) Clustered 6b) A…
A: Note: As per policy we are entitled to answer the 3 subparts of the question. 6 a) Sequential: A…
Q: Based on the following facts, which of the following is the most likely reason for a missing file in…
A: The above question is answered in step 2 :-
Q: 174. An audit trail ___________ a. Is used to make backup copies b. Is the recorded history of…
A: Audit trails are electronic records of events/sequence of events. They are basically history of…
Q: In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an…
A:
Q: CSM Tech has a sizable web presence, with multiple publicly accessible web and application servers.…
A: Introduction: The public DNS servers are doing recursive searches for both internal and external…
Q: Search the web for a tool that fetches DNS record (e.g., who.is, nslookup.io), then use it to…
A: The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online…
Q: We using thé fóllówing methods in HTTP: insert data to database Choose. Upload a document to the…
A: Get method is used to retrieve a document via HTTP from the server GET is used to request (retrieve)…
Q: epresents (does business with) many insurance companies (insurers). We will need to track each…
A: As a client may have an unlimited number of quotes. 1- 1:M An insurer may have an unlimited number…
Q: Password Cracking Each student should be able to access* one PassXX.hash file. This file…
A: <?php // These constants may be changed without breaking existing hashes.…
Q: DT_ATC_RS3 (config)# username techadmin password 63t0ut0fh3r3! DT ATC_RS3 (config) # enable secret…
A: It will not promt anything as it is only create password encryption. It will also not deny access…
Q: Explain in OWN words how cookies can show that a user has visited a site if that user's history has…
A: COOKIES - It is a small program in the form of text file which stores data about the users such…
Q: An employee has recently been hired to work in the Finance department. The IT administrator adds the…
A: Ans: An employee has recently been hired to work in the finance department. The IT administrator…
Q: In order for the public to view Web pages on the Internet that have been placed in a directory, the…
A: Language is one of the most widely used programming language which has been used to create different…
Q: ist created between two forests is called a(n) trust. 49. A(n) trust is formed when you create a…
A:
Q: Discussion: NTFS permissions provide access control for files and folders. Research and discuss NTFS…
A: Share permissions sometimes used to manage item and group availability: Whereas if standard…
Q: Local DNS name servers A. never cache resource records B. cache resource records, but discard them…
A: Local DNS name servers The correct option is option b. cache resource records, but discard them…
Q: (System Architecture) One type of authentication is biometric using fingerprint. An Automated…
A: Class Diagram : Class diagram for above scenario is shown below:
Q: Create a “user account policy” for Macon-Bibb. Include admins, staff, student Interns, and guests.…
A: Actually, NTFS stands for New Technology File System.
Q: one of the following tools extracts information of the target such as MX records and zone transfers:…
A: As per our guidelines we are supposed to answer only one question . kindly repost other question as…
Q: Fill in the Blak (Learning about DNS) a second-level domain b Mail Exchange(AIX) record C COuntay…
A: The method of generating and implementing multiple IP addresses on a specific Network Interface is…
Q: Domain Name system (DNS) resolvers use paxos and invalidation messages to maintain the consistency…
A: On the internet, computers always identify each other with unique numbers called IP addresses. They…
Q: shell script needed for the following
A: #!/bin/bash # Check for the presence of the two files. if [ ! -f host_list ] || [ ! -f known_hosts…
Q: ssume you had a function named update) that updates shared data. Illustrate how a mutex lock named…
A: Race condition is a situation in OS where two or more operation are being done at a same time. It…
Q: 1 Code a descriptor that accesses a distance of E9BF0AH up to F96CDE8H. If DS= EA97H decrements…
A: Answer: I have given answered in the handwritten format in brief explanation.
Q: they include. Describe each using examples and explain why they are used in a succinct manner. Is it…
A: Adding the CDN's address as a CNAME record for the origin server that hosts website content is a…
Q: Select the correct statement about authentication using passwords O a. Salt value will be sent from…
A: Hello Student, hope you are doing well, I will be trying my best to explain and fulfill your query.…
Q: Select the DDL command from the following. O a. delete O b. create O c. select O d. update
A: Dear Student, In SQL DDL is data definition language so all those commands which define a database…
Q: 1. Get access to CS5O IDE by following the steps in the document named "Using CSSO IDE" on LMS. 2.…
A: First create directory, using mkdir,
Q: What does a database account with the CREATE SESSION privilege allow the user to do?
A: CREATE SESSION privilege: The user can connect a database with the use of CREATE SESSION privilege.…
Q: 128. What does a null bitmap indicate? a. The database does not exist b. The record does not exist…
A: Given Data:- What does a null bitmap indicate? a. The database does not exist b. The record does not…
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Linux - Ubuntu Create a file named <yourdomain>.db in /etc/bind/, this file will containall the resource records for that domain. Edit the created file in the begining of question and add a SOA resource record. Consult and before setting the SOA values. Next set up an NS record and a corresponding glue record. Allocate one of the IP-addresses you created in porpose of building the Dns server to each subdomains NS. In the attached picture is the name of the domain . Would you attach the anwser with shotscreen for each step . Thanks13 of 28 C You have an Azure virtual machine named VM1 that connects to a virtual network named VNET1. You create a private DNS zone named contoso.com and add an A record named host1 to the zone. You need to ensure that VM1 can resolve host1.contoso.com. What should you do? Select only one answer. A. Modify the Access control (IAM) settings of the zone. B. From the zone, add a virtual network link. C. From the properties of the network interface, modify the options of the DNS servers. D. From the properties of VNET1, modify the options of the DNS servers.What type of authentication method is displayed in this picture? Multi-Factor Authentication Biometric Authentication Token-based authentication Single Sign-on 2.Wendy is examining the logs of a web server that was compromised by a remote attacker. She notices that right before the attack, the logs show a series of segmentation fault errors. Other logs indicate that the attacker sent very long input strings to the web server that had malicious commands at the end of the string. What type of attack most likely took place? SQL Injection Cross-site request forgery Cross-Site scripting Buffer Overflow 3.Jessica is combatting a security incident where a specific piece of malware is continually infecting systems on her network. She would like to use application control technology to block this file. What type of application control should she use? Greylisting Bluelisting Whitelisting Blacklisting
- The following is true about semaphores and try locks: * a)None of the above. b)There is no difference between them,they only differ how they handle cases where one process has acquired the semaphore (or try lock) and the other is attempting to do the same c)Semaphores only work with global (shared) variables while try locks with all kinds of IP objects like shared memory, FIFOs etc. d)Semaphores work for all kinds of IPC objects like shared memory, FIFOs, etc. while try locks only for with global (shared) variables.Computer Science Please do in virtual machine. attache the screenshot. 1. Use openssl commands to obtain SHA256 hash values for the following messages (Case Sensitive). Cybersecurity CyberSecurity Helloworld! Hello world! 2. Use openssl commands to obtain md5 hash value for the following messages (Case Sensitive). Cybersecurity CyberSecurity Helloworld! Hello world! 3. Show the path and file where the hash value of the user password is stored. Retrieve the line that contains the password/hash value.Back Story What is our domain name? Security.local Can you ping our domain name? Yes If you cannot ping the domain name (which you should be able to, you most likely have a DNS issue). So let’s check that. Opening command prompt in elevated privilege type and record the following output. Ipconfig /all *Do you see DNS servers? If not – type this: Ipconfig /flushdns – this will release current DNS info Ipconfig /registerdns – this will reregister DNS info *Do you see DNS servers? If not – type this: Ipconfig /renew – this will ‘re-ask’ the DHCP server for your DNS information Then double check with: Ipconfig /all Do you see IPv4 DNS servers now? Yes Of course a reboot will work, but when you are troubleshooting DNS or DHCP you don’t want to reboot each time you try something. Once you can ping security.local you can add your computer to the domain. Other things to note – as you move from desktop support to administration, it’s important to…
- You are creating an app that will allow university students to connect with advisors and other students to discuss stressful situations. Only students who attend the university can access the app. Which two steps should you take to protect student’s identity and personal information? (Choose two.) Group of answer choices Hash student data transmissions with a random salt. Hash the password using an algorithm in the Google database Hash the password with a random salt. Encrypt the password. Encrypt student data transmissions.a. Which of the following can be used for both encryption and digital signatures? 3DES AES RSA MD5 b. Digital Signatures provide which of the following? Confidentiality Authorization Integrity Authentication Availability c. The difference between a hash and a digital signature is: Hashes are used to verify message authenticity, digital signatures are used to verify message integrity. Hashes are used to verify message integrity and authenticity, digital signatures are used to verify message authenticity only. Hashes are used to verify the message integrity only, digital signatures are used to verify message authenticity and message integrity. There is no functional difference. d.Which asymmetric algorithm is used for establishing a shared key?A.Elliptic CurveB. PGPC. Diffie-HellmanD. RSA e.What is used to create a message digest that will be attached to data at rest or in transit? Asymmetric algorithm Symmetric algorithm Encryption Hashing Non-repudiation Authentication…Which of the following is recommended practice regarding the three versions of SMB. Leave all three versions of SMB on for backward compatibility Do not use SMB 3 because it is incompatible with non-MIcrosoft servers NFS is preferred over SMB in Microsoft environments Disable SMB 1 and 2 because they have security vulnerabilities (True/False) The Microsoft DNS server concept of Traffic Management provides for clients to resolve DNS queries to the nearest DNS server to the client.
- Domain Name system (DNS) resolvers use paxos and invalidation messages to maintain the consistency of cached records. True or False?Which encryption benchmark ensures data is not modified after it’s transmitted and before it’s received? a. Confidentiality b. Integrity c. Availability d. SymmetricDiscuss the trustworthiness of root certificates provided by browsers We have two users Hazem and Tamer, Hazem generates a random stream of bits using a random bit generator software and XORs bits with his key then send the results bits to Tamer over the network. Tamer XORs the received bits with his key (which suppose the same as Hazem’s key) and reply to Hazem with the results bits. Hazem compares the received bits from tamer with the original random bits. the comparison process to check whether the keys at the two sites are the same.as you noted in the previous protocol no keys are exchanged over network between Hazem and Tamer prove with details the steps that the values of the keys are the same at both users show by steps how can the opponent attack this schema to know the shared secret key