-network administration has been configured a standard ACL that will deny any traffic from 127.17.0.0/16 network, but permi Il other traffic, which of the following commands should be used to address this policy? Access-list 20 deny 127.17.0.0 255.255.255.255 Access-list 20 permit any Access-list 20 deny host 127.17.0.0 Access-list 20 permit any Access-list 20 deny 127.17.0.0 255.255.0.0 Access-list 20 permit any Access-list 20 deny 127.17.0.0 0.0.255.255 Access-list 20 permit any
Q: What's the point of defining a virtual destructor?
A: Introduction: When utilising a base class pointer object to destroy instances of a derived class, a ...
Q: 5. Write an SQL statement to display all orders from the tables Catalog2015 and Catalog2016 for orde...
A: Find the required query given as below :
Q: What exactly is data visualisation, and how does it function?
A: Data Visualisation can be defined as any graphical allocation or representation of any information o...
Q: What exactly do you get when you build a structure instance?
A: Introduction: When a structure instance is created, all of the structure's fields are zeroed. The f...
Q: 1. How is data exchanged between components acco
A: NOTE: ACCORDING TO COMPANY POLICY WE CAN SOLVE ONLY 1 QUESTION. YOU CAN RESUBMIT THE QUESTION AGAIN ...
Q: f 64KB is hav $ 24 bits. Th to the cache s. е са
A:
Q: What are the two most common types of UPSs?
A: Introduction: Usually there are three types of UPSs. Two primary types of UPSs would be:- Online ...
Q: (4) Rewrite the following program by using addressing. (You are not allowed to use indirect addressi...
A: For question number 4: First you need to know that what is addressing mode and other properties rela...
Q: Create a version of the hybrid merge-join method that is suitable for situations where both relation...
A: Introduction: There is a big difference between a merge join and a hybrid merge join. After learning...
Q: Construct a dfa that accepts the language generated by the grammar on E={a, b} s> bS | aA A > bA | a...
A: Before we can construct a DFA, we need to observe that the given grammar produces. Note, initially w...
Q: Suppose we have a virtual address of 26 bits in a byte addressable machine. Page size is 8K bytes. A...
A: Suppose we have a virtual address of 26 bits in a byte addressable machine. Page size is 8K bytes. A...
Q: What component does an application use instead of dealing directly with the database?
A: A database management system's components Every DBMS comes with a set of integrated components and t...
Q: Considering a fully associative cache with four 8-byte blocks, what is the hit rate of the following...
A: Answer: Given, fully associative cache with four 8-byte block Assume array size 4 byte in...
Q: How can transport protocols be utilised to meet the demands of users? For each service, mention TCP,...
A: Introduction: Consider UDP to be a mailbox and TCP to be a telephone. Both have a phone number that ...
Q: Which of the following statements creates an array of elements of the integer data type with a lengt...
A: which of the following statement creates an array of element of the integer data type with the lengt...
Q: your ow
A: As per guidelines, we can only solve one question at a time. Hence resubmit the question for further...
Q: Define a Prolog predicate rdup(L,M) to remove duplicates from an ordered list L. The resulting list ...
A: Here we write simple prolog code to remove duplicate list: ================================== Here w...
Q: how can we read the following txt document and store in a string array in C++. abc efg hello world ...
A: #include<iostream> using namespace std; int main() { string array[5] = {"Abc", "Egf", "H...
Q: FDDI networks speeds are faster than modern connections to workstations and servers, but modern inte...
A: FDDI networks speeds are taster than modern connections to workstations and servers, but modem inter...
Q: What does the following Python code print to the terminal? (Assume we run this as a complete snippet...
A: Option D: Error, Tuples are immutable
Q: if you wanted to make a raft what properties do you need
A: Raft is the lower structure to support the whole building. It is a broad cement platform high - stre...
Q: Create webpage using html. implement these things: In the heading display your first and last name f...
A: <!DOCTYPE html><html lang="en"> <head> <meta charset="UTF-8" /> <t...
Q: (a) Design Mod 80 Counter using IC# 74293 . You can use Other logic gate if necessary. (b) design M...
A: a. IC#74293
Q: # Global constant for body mass which is equal to 703 # Create variables and initialize all of them ...
A: # Global constant for body mass which is equal to 703BODYMASS = 703 #Create variables and initialize...
Q: f "there is neither frame id nor frame name," which strategy should be used in the script?
A: Introduction: If "there is neither frame id nor frame name," which strategy should be used in the sc...
Q: Explain how nested loops are used to assign and report values from multidimensional arrays.
A: Introduction A nested loop is a mechanism where we write a loop inside another loop and for multidi...
Q: What are the risks connected with using the MD5 algorithm to sign certificates?
A: Given: What are the vulnerabilities associated with signing certificates using the MD5 algorithm?
Q: Which of the following statement refers to the main difference between the operation of inbound and ...
A: Answer: Inbound ALCs are processed before the packets are routed while outbound ALCa are processed a...
Q: Could you clarify what cloud scalability implies and how it works? What are some of the features of ...
A: Introduction: Cloud scalability refers to the capacity to increase or decrease the quantity of infor...
Q: If you mistakenly delete a file and want to recover it, you must do the actions outlined below.
A: We are going to understand if one has deleted a file in their system then how can one recover it.
Q: Is it necessary to test only after the build and execution phases have been completed?
A: When we create any code we generally have to execute the file at the building time itself. Lets take...
Q: a recursive function called print_num_pattern() to output the following number pattern. Given a pos...
A: Introduction A recursive function called print_num_pattern() to output the following number patter...
Q: What does a Details view entail?
A: DetailView Class helps in displaying the values or the utility of a single record which is from the ...
Q: 6. Following data are coming from a biometric system. It has four sensors. The designer decides to r...
A: Solution ::
Q: Create an Algorithm Design A number divisible by 2 is considered an even number, while a number whic...
A: Pseudo code is an informal language code, which helps the person who is writing the code or the prog...
Q: 5: Truth tables are used to establish the validity of complex sentences. Show and explain how they e...
A: Truth table is basically used to represent the propositional logic or to check statement assertion i...
Q: What is multifactor authentication, and how does it work? What role does it play in password securit...
A: Introduction: Multiple forms of identification may be used to verify a user, such as a password, a s...
Q: 1. Consider a binary number (10101110),. What base-10 number this binary number is equivalent to if ...
A: As given, we need to need to convert the given binary number (10101110)2 into decimal number. a) Fi...
Q: The next two questions deal with the definitions of f1 and f2 in Racket below, and the subsequent 4 ...
A: Ans: The following that is a faithful representation of the Racket program in our language is: A C
Q: What are the benefits and drawbacks of fiber-to-the-home and fiber-to-the-business networks?
A: Introduction: Fibre to the home refers to the construction and usage of optical fibre from a central...
Q: What value is printed after the following statements are executed? mylist = ['HELLO'] * 5 print(myli...
A: Given :- What value is printed after the following statements are executed?mylist = [ 'HELLO '] * 5p...
Q: Design a C++ program to store AND retrieve grocery information using the following guidelines: (1) W...
A: Create a program for grocery shopping store that contains minimum 5 items and its cost accordingly
Q: 1. Order the following functions by asymptotic order of growth (lowest to highest) | 2n | 3log n |2"...
A: 1) Following are the asymptotic order of growth Constant Function < Logirithmic Function < ...
Q: Could you tell me the names of the three primary frequency bands used in wireless communication syst...
A: Wireless communication systems make extensive use of three primary frequency bands, the names of whi...
Q: 2. Write a recursive JAVA program to input a natural number N and using recursion print all the natu...
A: Write a recursive JAVA program to input a natural number N and using recursion print all the natural...
Q: Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to ent...
A: Flowchart:
Q: How does Lapadula Model detect security risks? O violation of CIA principles O Violation of informat...
A: the answer is an violation in CIA principles
Q: Sony PlayStation Network hack in April 2011. Could the hack have been prevented? If so, how?
A: There was attack to sony back in 2011 that is called network hack and in that time, sony was not abl...
Q: What are the most significant considerations to bear in mind while considering data backup and resto...
A: Introduction: It is critical to have a backup plan in place that allows for quick and easy data reco...
Q: Determine whether the following statement is TRUE / FALSE
A: 1. A data model is usually graphical.-----> True 2.Database designers determine the data and info...
Step by step
Solved in 2 steps
- Assume a web server can only receive TCP connections on port 80 (HTTP) and 22 (SSH), but not on any other ports. The web server can only establish connection to a database server hosted on private IP 192.168.100.100 on port 3000, but to no other machines inside or outside the network. Imagine this web server is running Linux, and we’re using iptables to define host-based firewall rules for it. Show the set of iptables commands to install necessary rules for this security policy.Assume Host C has a Web server on port 80. Assume this Web server accepts requests from Host A and B and allows persistent connections. Is Host C sending all requests over the same socket? Do they both have port 80 if they're sent over separate sockets. It's worth discussing.Step 1: Write a script to find and print your local IP address Use the following code: import socket hostname = socket.gethostname() local_ip = socket.gethostbyname(hostname) print(local_ip) Step 2: Write a script to find and print your OS platform and release (for example, "Windows version 10") Use the following code: import platform print(platform.system ()) print(platform.release ()) Step 3: Write a script to find and print a "ping sweep"? Use the following code: import os my_ip="192.168.10.103" # sub your ip address os.system('ping -n 4 {}'.format(my_ip)) Step 4: Write a script to find and print current day and time import time now = time.localtime() print(time.strftime("%m/%d/%Y %I:%M:%S %p", now)) Extra Credit: Add code to Step#4 which prints a greeting, either "good morning", "good afternoon", "or good evening", depending on the current time.
- Let's say Host C is a Web server that listens on port 80. Assume that this web server allows persistent connections and that it accepts requests from hosts A and B. Is Host C using the same socket to transmit each request? If they're broadcast over different sockets, do they both have port 80? You should talk about it and provide an explanation.Assume Host C runs a Web server on port 80. Assume that this Web server accepts requests from Hosts A and B and that persistent connections are enabled. Is Host C sending all of the requests through the same socket? Do they both have port 80 if they're broadcast via distinct sockets? It's something you ought to discuss and explain.1. Persistent HTTP requires?a. 2(round trip times) + file transmission timeb. as little as two RTT for all the referenced objectsc. one file transmission timed. as little as one RTT for all the referenced objects 2. UDP has no connection between client & server?a. RCVR extracts sender IP address and portb. sender explicitly attaches IP destination address and portc. three other answers are incorrectd. no handshaking before sending data 3. A socket in computer networks is correctly defined as?a. A combination of IP address and port number, connected by a "/" symbolb. sender explicitly attaches IP destination address and portc. RCVR extracts from the socket, sender IP address and portd. A combination of IP address and port number, connected by a"." symbol 4. The data link layer provides?a. the functional and procedural means to transfer data between network entities and the means to detect and possibly correct errors that may occur in the link layer.b. the functional and procedural…
- Assume Host C is running a Web server on port 80. Assume that Hosts A and B are currently submitting requests to this Web server, which supports persistent connections. Is Host C using the same socket to send all of the requests? If they're being sent over different sockets, does each one have port 80? Discuss it and give an explanation.COM Assume a web browser at a client host (212.13.14.16) wants to send a message to a web server (156.10.10.2) but a firewall at the client's gateway (212.13.14.1) is configured to block all outgoing packets to 156.10.10.2. The client does have access to a VPN application (similar to the one used in the labs) and can use it to connect to a VPN server (130.16.10.2). Describe how the client should set up a tunnel to bypass the firewall so that the web browser can send a message to the web server (156.10.10.2). You must trace the pathway of the message originating at the web browser on the client host and headed to the VPN server explaining how it traverses through different layers (application, transport, network etc.) in the client host and finally reaches the VPN server application. You must also trace the relevant hops (i.e., the IP addresses) the packet navigates through along the way. You need not trace the reply message and you also don't need to focus on the encryption details.…One of the following port security violation modes causes the packets from unfamiliar source address until sufficient number of MAC addresses drop below maximum value: Protect Shutdown Restrict Violate
- You are assign to setup a real LAN network with 2 real servers PC with Centos. The nework IP address range selected from the network is 172.16.16.0/24.The two(2) servers to be setup is a FTP server (172.16.16.23) and a Web Server and DHCP Server setup in a VirtualBox environment in the 2nd server. WebServer(172.16.16.80) and DHCPServer(172.16.16.2).Show the instruction step by step to Setup the IP address of all the servers using the nmcli command.Let's pretend Host C is running a Web server on port 80. Suppose this Web server allows both Hosts A and B to make persistent connections. Is it possible that Host C is sending several requests over the same socket? Does port 80 exist in each of these connections if they are being sent through separate sockets? You should discuss and elaborate on this.consider 3 hosts (A , B and C) where A is running 3-TCP process, B has 1-TCP process and C is running 2-UDP process all process are trying to connect to a web server to download a file . How many new socket(s) will be created at the server side? Explain why?