You have installed Qualys cloud Agent on the target host. Next, you want to assign a patch job but that cannot be done until cerlainpatth manag below, check all the steps required to complete the patch management setup Choose all that DAssign host to CA Configuration Profite (with PM enatlec O Awgn hos to the PM Aset Group apply DAsign host to an enabled PM ASsessment Profie O Activate PM module on host
Q: This coursework consists of two tasks. The first task is based on Linux scripting and the second one…
A: Command Description mkdir command Creates a new directory rmdir command Deletes the specified…
Q: User A is trying to configure DHCP server from a client . Which of the below properties is valid to…
A: as a name suggest dynamic host configuration protocol helps to assign IP address anonamously.when a…
Q: QUESTION 40 Which of the following tools runs on bastion hosts? Packet filtering firewall…
A: Which of the following tools runs on bastion hosts? Packet filtering firewall Application level…
Q: The netstat command (available on Linux and Windows) displays a computer's active network…
A: Netstat is a command which is used in LINUX or WINDOWS to display the number of incoming and…
Q: Configuration Task Command Syntax Switch(config)# hostname name No. 2 tta the nege U epassword…
A: 3. Configuration Task :- encrypting all clear text password Command syntax:- the command _service…
Q: penetration programming Modify the .sh script so that it also works interactively. Specifically,…
A: According to the information given:- We have to modify the mention bash code on the basis of…
Q: Question 10 The below commands perform the same action of temporarily assigning an IP address and a…
A: /etc/hosts It is used to map the hostname with IP address. Once they are mapped, hostname can be…
Q: A security analyst receives an alert regarding multiple logins to the corporate doud infrastructure…
A: As per Bartleby guidelines, Since you have asked multiple question, we will solve the first question…
Q: The netstat command (available on Linux and on Windows) shows the active network connections on a…
A: “netstat” is the shortened form of “network statistics”. It is a command which is used in…
Q: Q. Hypervisor uses for access control? Q. are some major approaches to host security? Q. supported…
A: These questions are based on virtualization. Here i am giving the explanation about what is…
Q: In this Open-ended lab, you are supposed to develop one client and two servers. The client registers…
A: Actually, given information is: In this Open-ended lab, you are supposed to develop one client and…
Q: web server
A: Given :- An attacker tries to do banner grabbing on a remote web server and executes the…
Q: Error getting list on sites from the target environment, domain could not be contacted". How to fix…
A: Domain controller - A domain controller is a kind of server that verifies users on computer…
Q: This site can't provide a secure connection ievolvecontent.ultimatix.net sent an invalid response.…
A: this is the proxy issue when you are connecting with some secure site with a company asset this…
Q: The netstat command (available on Linux and on Windows) shows the active network connections on a…
A: The answer to the question is given below:
Q: You are a network administrator for your organization and are required to plan anddeploy a new file…
A: Service For Server to Maximize Security: The servers are the foremost and the most important thing…
Q: A new application will be deployed on EC2 instances in private subnets. The application will…
A: A new application will be deployed on EC2 instances in private subnets. The application will…
Q: Q3\ Give the configuration process in the short term for the following procedure 1- Write the…
A: IP address: Ip address stands for internet protocol address. These addresses are used to identify…
Q: Q. server is used to accept any registration requests from the user agents or in other words it is…
A: These Questions are based on Networking, Let's briefly discuss about what is networking?:…
Q: A different seubhet mask which of the following s tou mic NAT about the dyha Changes destinatio…
A: NAT fullform is Network Address Translation NAT is use to translate private IP address to public Ip…
Q: Suppose you are working as a technician in the company Al-Reem Batteries. The network administrator…
A: CLI modes Router> <– User EXEC ModeRouter# <– Privileged EXEC modeRouter(config)#…
Q: Assign a dynamic IP address to a client on interface eth0 Find out the path of the packet to the…
A: 1. Assign a dynamic IP address to a client on interface eth0: 2. Find out the path of the packet to…
Q: Which of the following creates and manages a VM (virtual machine) and allocates hardware resources…
A: We need to find which creates and manages a virtual machine. Which allocates hardware resources for…
Q: New DNS servers have been added to the server configuration of your DHCP server. What is the most…
A: Foundation: The appliance will broadcast any changes to the DNS server's A records immediately, but…
Q: User A is trying to configure DHCP server from a client. Which of the below properties is valid to…
A: Only the DHCP operator supports this, the user must be DHCP operator. Only the operator can change…
Q: Which statement is true about Staged Payload? O Instructs the target machine to open a shell command…
A: It is a payload of type staged type windows/shell/reverse_tcp. In the whole process string sent to…
Q: For the Security tab in the AP configuration, to prevent pings coming from outside the AP LAN/…
A: Computer network: A group of computer system or computer nodes that are connected to each other and…
Q: If you were to see the following command run, what would you assume? hping -S-p 25 10.5.16.2 Someone…
A: Answer: hping is a program used to send uniquely planned messages to a target. You use command-line…
Q: Which of the following is not a function of the session layer in the OSI model? O a. Establish,…
A: Communication between the processes is not a function of the session layer.
Q: Suppose you are working as a technician in the company Al-Reem Batteries. The network administrator…
A: We will use cisco packet tracer to solve the following problem.
Q: You are a network administrator for your organization and are required to plan and deploy a new file…
A: A network administrator's admin responsibilities include installing, Configuring and supporting an…
Q: Refer to Figure Q.4. An administrator is trying to configure RIP version 2 on R2 to enable the…
A: According to the given diagram the router is connected to network of 192.168.100.0,192.168.200.0 and…
Q: While troubleshooting an E-mail client issue on a user’s system, you that the incoming mail server…
A: CORRECT OPTIONS: While troubleshooting an E-mail client issue on a user’s system, you that the…
Q: Page 2 was alerted by the host firewall by a generic alert which might suggest an abnormally high…
A: Steps to Capture Packets > capture-traffic Please choose domain to capture traffic from:0 - eth01…
Q: >>sudo tcpdump -nnvvXSs 1514 -i eth1 ‘proto ICMP’ Can you think of some use for this approach?…
A: Please check the step 2 for solution
Q: Which of the following is not a footprint-scanning tool? a) SuperScan b) TcpView c) Maltego d) OWASP…
A: Super scan, TCP view , Owasp zed is the used for foot print scanning tool Maltego is the tool for…
Q: ensure that the application should check whether the data has been received and if not, it should…
A: Solution:-
Q: Which component uses port mirroring to collect information from domain controllers and DNS servers?…
A: Component using port mirroring method for collecting information from domain controllersAdvanced…
Q: Given the following commands, explain what the purpose of the command is and give a typical use case…
A: show interfaces
Q: If we want to run Snort in Network Intrusion Detection System (NIDS) mode so that we don't record…
A: Solution: Given,
Q: Mary is a system administrator in your organization. She has recently made changes tothe DHCP…
A: DHCP configuration Dynamic Host Control Protocol (DHCP) is a network protocol. A Dynamic Host…
Q: a) how to check the reachability of Metasploitable2 from Kali Linux by sending ICMP echo request…
A: (a) To check the reachability of Metasploitable2 from Kali Linux, you can give the accompanying…
Q: e) Open command prompt in desktop of Saeed Pc and then Ping IP address 10.10.10.1 f) What output you…
A: The connection between saeed and Ali pc is not defined so I have taken two pc's and connected them…
Q: Suppose you are working as a technician in the company Oman Cements. The network administrator has…
A: We will use Cisco Packet Tracer to solve the given problem.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Choose one answer for this question: - A cloud administrator needs to store images that are uploaded by users through a mobile application. The solution needs to include security measures to avoid data loss. Which step or steps should they take to protect against unintended user actions? a. Upload the images to Amazon S3 by using presigned URLs. Employ strict bucket polices, and enable S3 Versioning. b. Store data in two Amazon S3 buckets in different AWS Regions. c. Store data in an Amazon Elastic Block Store (Amazon EBS) volume, and use AWS Certificate Manager to encrypt the data. d. Store data in an S3 bucket, and enable S3 Block Public Access.penetration programming Modify the .sh script so that it also works interactively. Specifically, if no hostname is given on the command line, the program should interactively ask for a hostname, starting port, and ending port with three separate prompts, and carry out its scan using those values. After scanning finishes, the program should loop to receive another set of values, stopping only when the user enters a blank host name. If this feature is implemented properly, it will also allow you to run the script in ’batch’ mode, by “piping in” a plain text file with the hostname on the first line, start port on the second, stop port on the third, and repeating for as many hosts as you wish to scan. For example, if a file named hosts_to_scan.txt contains a list of hosts and ports in the proper format, the program should now work as follows: cat hosts_to_scan.txt | ./portscanner.sh The timeout argument should still work in this case as well: cat hosts_to_scan.txt | ./portscanner.sh -t 3…You are the network administrator for Slimjim, a peripheral device company. Thenetwork uses Linux, and you need information on some commands to perform your job.Open the manual pages and find all the commands that have the word “copy” in theirname or description. What command did you use to accomplish this task? Are there anycommands in this list that only a root user can execute? How are they indicated? Selectany two of them and compare their info and manual pages. Access and read the manualpages on three other commands that interest you either by using the command name orsearching for them by related keyword (try using apropos).
- The netstat programme, available for Linux and Windows, provides a list of active network connections. Describe how to use this command to identify whether a web page is not terminating connections or, if connection pooling is being used, is not returning connections to the pool. You may do this by looking at whether or not the connection is being returned to the pool. There is a possibility that connection pooling will not immediately terminate the connection.you must provide training videos for the networking staff using Windows Server 2019. Additionally, these videos will be hosted on an Apache web server running on Ubuntu Server 20. Find a cloud service provider that will allow you to create 4 VMs: 2 of these VMs will be the two OS from scenario 1 moved to the cloud, the third VM will be running Windows Server 2019, and the fourth VM will be for the Apache web server hosting all of the videos. justifying the cost of the solution, and analyzing the security aspects (good/bad) of the solution.Under which condition is using the trial-and-error approach not advisable? (Choose all that apply.) a. You can undo changes easily. b. A server or network device is live on the network. c. You can’t undo changes easily. d. No data can be lost.
- A new application will be deployed on EC2 instances in private subnets. The application will copy/write some sensitive data from/to an S3 bucket. Company compliance policy requires that the data must not traverse the public internet. Which solution meets the compliance requirement? A.Access the S3 bucket through an VPC end point for S3 B.Access the S3 bucket through a proxy server C.Access the S3 bucket through a NAT Gateway D.Access the S3 bucket through the SSL protected S3 internet endpointA company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) : A. Deploy a WAF. B. Use containers. C. Conduct input sanitization. D. Patch the OS E. Deploy a reverse proxy F. Deploy a SIEM. ~if you could explain why you chose that correct choice, Id appreciate it. Thank you!QUESTION 1 Assume that you work as a network administrator. A colleague approaches you with an issue that he is not able to access the company's services on the server. After troubleshooting, you identify the firewall as a possible cause for the issue. To confirm this, you need to verify the firewall configuration in your colleague's computer. Which of the following cmdlets will you use for this purpose? a. Get-NetFirewallRule b. Get-NetFirewallProfile c. Set-NetFirewallProfile d. Set-NetFirewallRule
- Create an executable script to automatically launch the VNC viewer and connect to the Linux server with SSH tunneling . The script should automate any password entry so that no passwords will have to be entered when the script is executed. Demonstrate its use. (in fedora linux)On servers with Linux operating system, access logs are kept under which of the following directories by default?A) /var/log/B) /var/log/auth/C)/log/D)/log/auth/ Which of the following would an attacker prefer to run operating system-level code with MSSQL?A) MSSQL cannot run code at the operating system level.B) MSSQL agentC) xp_cmdshellD) There are no options. As a network administrator, you want to reduce the attack surface on your systems. Which of the following helps?A) Creating shared folderB) Make sure that only the necessary services are activeC) To record access activitiesD) monitor network traffic Which of the following products can an institution prefer to use if its antivirus software is up-to-date on the computers in its network?A) FirewallB) DLPC) Web ProxyD) NAC When John enters the mobile banking app on his smartphone, he sees his account balance is decreasing. What would it be better for John to do first to fix this situation?A) Closing and reopening the mobile…Both the Linux and Windows netstat programs provide a list of currently active network connections. Walk me through the steps to use this command to see whether a site is properly terminating connections or, if connection pooling is being utilized, not returning connections to the pool. The end of the connection might be delayed if many users share it.