Refer to the below output, which of the following can be determined about port security?
Q: Which of the following is true regarding XSS?
A: XSS (Cross site scripting) is a susceptible security susceptible that allows the hacker to attack…
Q: You are a network administrator who is in the process of building an Active Directory network and…
A: Step 1 The answer is given in the below step
Q: Which one of the following is not a security mechanism in X. 800 standard?
A: X.800 divides these services into five categories. They are: Authentication Data Integrity Access…
Q: From a user's perspective, what is the difference between the download-and-delete mode and the…
A: The answer of the question is given below:
Q: (a) Graphically. Please provide the commands you used as well as your outputs (i.e. the root).
A: Answer is given below:-
Q: Explain the difference between session cookies and persistent cookies. In your session cookies and…
A:
Q: Which of the following operations replaces plaintext characters with different ciphertext…
A: 1) Substitution cipher is a method of cryptography which converts standard plaintext into…
Q: If the port is configured with Dynamic desirable on one end and nonegotiate on the other, the…
A: The given statement "If the port is configured with Dynamic desirable on one end and nonegotiate on…
Q: Describe a circumstance in which one of the four access control mechanisms may be used. What makes…
A: The above question is answered in step 2 :-
Q: Which of the following variables is not a distinctive sign of a phishing message?
A: It is a type of cyber security attack where a malicious user steals the credentials of the victim by…
Q: Your company has grown significantly, and suddenly there is a significant increase in the usage of…
A: Introduction: File & Storage Services contains technologies that let you build and manage one or…
Q: . Client side error indication series is
A: Given To know about Client side error indication series is
Q: Which of the following statements are correct? IPv6 datagrams do not have the checksum field IPv4…
A: Solution : IPv4 and IPv6 The IPv4 network protocol is a packet-switched Link Layer protocol (e.g.…
Q: Write a regular expression to match an IP address in a log file.
A: ‘[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'
Q: Which of the following are atomic operations? TestAndSet X++ Load R1, x V y = y + 2
A: We all know that when an atomic operation executes no other process can read through or modify the…
Q: What is the use of the synchronized keyword? What is the difference between synchronized and…
A: Use of the Synchronized Keyword - The synchronized keyword prevents concurrent access to a block of…
Q: Can you create an executable script that will use nmap scans at varying intervals to scan 10 well…
A: Can you create an executable script that will use nmap scans at varying intervals to scan 10 well…
Q: Which access level yields the quickest results?
A: Introduction: Access levels determine who has access to certain web portal features. This is in…
Q: Based on your understanding which of the following statements describes the verbose failure messages…
A: The design always depends on providing security to the user. So the design fault include using a…
Q: Which of the following is TRUE of the effective permissions in this scenario?
A: We need to answer the following questions:
Q: what will be the output of the followint script? %List of sub areas AA=[10, 5, 5]; %List of centroid…
A: disp is the command used to print content on console Thus, cntrd is the only thing that is printed
Q: Objects can be converted to JSON(Serialized) using which of the following? Question 1 options:…
A: Please find the answer below :
Q: what is the purpose of the following code? CBI DDRB, 4 SBI DDRB, 7 loop: SBIS PINB, 4 JMP next CBI…
A: option (a) is correct.
Q: The application should support integrity verification. That is, your client and server will…
A: Find a code implementation below!
Q: Write a PHP script that creates the following table using while loops. Add cellpadding="3px" and…
A: Given Conditions for PHP program:- cellpadding="3px" and cellspacing="0px" to the table tag And need…
Q: Which of the following is not a field in TCP header ? a. Sequence number b. Fragment offSet c.…
A: Fragment offset (13 bits) – it is use to identify sequence of fragments in the frame. It generally…
Q: How would I give only a files group execute permissions in linix terminal?
A: The command that is used to change the permissions in the linux terminal is chmod command.
Q: What would be the [q, f] entry in the ACM after executing the following command?
A: The correct solution is (r w c) Explanation…
Q: Discuss the purpose of granting “sudo” access. Why is it a good idea not to log in as a root user?
A: "sudo" command is run to granting root privileges to current user account. The permission is…
Q: in a pipe, the sed and awk commands are often used filter commands. Is this correct or incorrect?
A: Explanation: A pipe can only transfer the standard output of one operation to the standard input of…
Q: Which of the following statements is true with respect to the interpretation of "If in a datagram IP…
A: The Answer is in Below Steps
Q: For formatting data inside a pipe, the sed and awk commands are frequently used filter commands. Is…
A: Awk is mostly used for scanning and processing patterns. It checks one or more files to consider…
Q: Which of the following statements is true for dealing with the deadlock problem: i. We can use the…
A:
Q: We can use wildcard characters such as asterisk * and question mark ? the same way in both Command…
A: In cmd wildcard are used to match a character that can be used in the place of an unknown character.…
Q: Consider the user login homepage in Figure Q3, answer Q3(a) to Q3(c). • Case 1 - Both the username…
A: Answer: We have drawn decision tree and we have written code in C++ programming language
Q: The phrase "save and forward" is seldom used in regular conversations anymore. Investigate the…
A: Introduction: In everyday communications, "store and forward network" technique is no longer used.…
Q: What ps -x command do ? and then explain the purpose (the different parameters/info of the output)?…
A: Answer: 1. ps -x command: The ps command displays the currently running processes in the system. It…
Q: You are a network administrator who is in the process of building an Active Directory network and…
A: According to the information given. We have to process the active directory network create 75 user…
Q: when the command "LXI H, 9001 H" is executed, what happens?
A: The 8085 microprocessor is an 8-bit processor that includes on its chip most of the logic circuitry…
Q: Which of the following operations do not achieve non-repudiation? a. Encryption using hybrid…
A: MAC do not achieve the non-repudiation. option d is the correct answer.
Q: When which of the following procedures meet an issue, do blue screen errors occur?
A: Introduction: When an issue forces your device to shut down or restart abruptly, you may see a blue…
Q: Which of the following statements best describes how you feel about the safety of data while it is…
A: Authentication: Authentication refers to the process of determining whether or not someone or…
Q: An assignment ask me to find the temperature by dividing global variable THERMO_SENSOR_PORT by 32…
A: Below i convert the assembly language
Q: Write a script to prompt the user separately for a character and a number, and print the character…
A:
Q: What is the protected access specifier and how does it work?
A: Access specifiers are the keyword which are used to mention the level of access of any variables or…
Q: offset columns in Bootstrap
A:
Q: ow many bytes are used for a port number?
A: Required: How many bytes are used for a port number?
Q: Which of the following could be inserted in a direct access table with 5 buckets, out of which 4 are…
A: Answer: 3
Q: Which of the following synchronization tools will not involved busy waiting in applying mutual…
A: In software engineering, mutual exclusion is a property of simultaneousness control, which is…
Q: Write a script file to find a solution n 2n-1 Y= - (2n- 1)! i=1
A: Python Code :- print("Enter the n value ")n=int(input())print("Enter the X value ")x=int(input())…
9
subject Scaling Networks
Step by step
Solved in 2 steps with 1 images
- One of the following port security violation modes causes the packets from unfamiliar source address until sufficient number of MAC addresses drop below maximum value: Protect Shutdown Restrict ViolateStep 1: Write a script to find and print your local IP address Use the following code: import socket hostname = socket.gethostname() local_ip = socket.gethostbyname(hostname) print(local_ip) Step 2: Write a script to find and print your OS platform and release (for example, "Windows version 10") Use the following code: import platform print(platform.system ()) print(platform.release ()) Step 3: Write a script to find and print a "ping sweep"? Use the following code: import os my_ip="192.168.10.103" # sub your ip address os.system('ping -n 4 {}'.format(my_ip)) Step 4: Write a script to find and print current day and time import time now = time.localtime() print(time.strftime("%m/%d/%Y %I:%M:%S %p", now)) Extra Credit: Add code to Step#4 which prints a greeting, either "good morning", "good afternoon", "or good evening", depending on the current time.in a terminal run the following commands: Find your hostname of your computer by running: hostname. Install nmap: sudo apt install nmap. Run nmap: nmap [Your Hostname] and note which transport and ports are open. Take a screenshot of the demonstration.
- YOU MAY FIND THE ANSWER TO THESE QUESTIONS ON CHEGG BUT THEY ARE EITHER INCOMPLETE OR WRONG. PLEASE SOLVE THEM YOURSELF Use the following configuration in this lab : Virtualbox Kali linux (or any Linux distribution) - > minimum RAM = 500MB windows XP where Wireshark is installed → minimum RAM = 500 MB Step 1 : Initial configuration This configuration can be done using internal network connection in the virtualbox and a manual assignment of IP addresses. Be sure that both machines belong to the same internal network (having the same net prefix and the same network mask) Kali Linux : 100.17.0.10 \ 8 Windows : 100.17.0.20 \ 8 use the ping command to test the connection from both sides. Show the result of each ping command using a screenshot : …......................................................... Step2: open Wireshark in the Windows machine and set a filter “tcp”. Use hping3 command in Kali Linux to send two packets to the windows machine like the following : -…Use the following configuration in this lab : Virtualbox Kali linux (or any Linux distribution) - > minimum RAM = 500MB windows XP where Wireshark is installed → minimum RAM = 500 MB Step 1 : Initial configuration This configuration can be done using internal network connection in the virtualbox and a manual assignment of IP addresses. Be sure that both machines belong to the same internal network (having the same net prefix and the same network mask) Kali Linux : 100.17.0.10 \ 8 Windows : 100.17.0.20 \ 8 use the ping command to test the connection from both sides. Show the result of each ping command using a screenshot : …......................................................... Step2: open Wireshark in the Windows machine and set a filter “tcp”. Use hping3 command in Kali Linux to send two packets to the windows machine like the following : - packet nature : tcp - number of packets : 2 - destination port : 23 - Flag SYN active - interval time 100 microseconds…Linux Command Function ifconfig also: ifcfg, ifup, ifdown, ethtool, nm-tool /etc/init.d/networking restart ip link set down ip link set up The ifconfig command is a tool used to displayand configure network interfaces. Thiscommand will display information about thenetwork card, IP address, broadcast address,and network mask. It also shows how manypackets were received and transmitted. Thereis also information about the loopback device(lo). ping The ping command allows the user to testwhether or not a network connection is active,the speed of that connection, and how anetwork behaves given specific data loads. arpalso: arping The arp command by itself is used to view theinformation currently in the ARP table (AddressResolution Protocol). This table maps the IPaddress of machines on your network segmentwith their MAC address. hostnamealso: domainname, dnsdomainname The hostname command tells you what thehostname of your machine is set to. Thehostname is…
- Question 13 sum.Why would you want to run the RODC (read-only domain controller) on Windows 2008 and newer versions? What are available in the newer versions that's not available in previous versions. Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this lineQuestion 1 Full explain this question and text typing work only thanks TRUE/FALSE part A,B C solution sent me with explain A. An Extend Access List is created when you choose 100 - 199* False True B . To assign an access list to an interface type ip access-group 100 out* False True C. A Named Access List is created when you choose 1-99* True FalseWhich of the following firewalld commands can be used to allow incoming SSH connectionsthe next time the system is booted?a. firewall-cmd --add-service sshb. firewall-cmd --add-port 22/tcpc. firewall-cmd --add-port 22/udpd. firewall-cmd --add-service ssh --permanent
- Execute the following commands in Linux and write their output1. ping :This command is used to test connectivity between two nodes. Ping use ICMP (Internet Control Message Protocol) to communicate to other devices. You can ping host name or ip address using below command.Example: ping www.google.com$ping <server-ip-address>Output:$ping localhostOutput:$ping <other-ip-in-network>Output: 2. hostnameGives the host name of the computer they are logged into. To set the hostname permanently use /etc/sysconfig/network file.$hostnameOutput : 3. traceroute traceroute is a network troubleshooting utility which shows number of hops taken to reach destination also determine packets traveling path $traceroute ip-addressOutput 4. netstatNetstat (Network Statistic) command displays interfaces, connection information, routing table information etc. $netstatOutput : Execute it with the following options and write the output:netstat –t netstat –s –t netstat -i 5. ifconfigifconfig is used for…You want to find weaknesses on a host device and compile findings into a database. What do you use? A. Ping B. Port scanner C. Vulnerability scanner D. Exploit toolkitWrite a script to find and print your local IP address Use the following code: import socket hostname = socket.gethostname() local_ip = socket.gethostbyname(hostname) print(local_ip)