Concept explainers
a)
The following screenshots demonstrate the given steps:
- In “Step 1”, the website www.amazon.com was browsed in “Google Chrome” browser and minimized at right side of the window as mentioned in “Step 2”.
- Similarly, the same website was browsed in “Firefox” browser and minimized at left side of window as mentioned in “Step 3” and “Step 4”.
Screenshot of step “(1) (2) (3) and (4)”
- My name “John” has been searched in amazon search box as mentioned in “Step 5”
Screenshot of step “(5) and (6)”
- In “Firefox” menu, click on “Add-ons” and the “Get Add-ons” page has been opened.
Screenshot of step “(7) and (8)”
- Search the “Adblock Plus” on “Google” and install the latest version in Firefox browser.
Screenshot of step “(9) (10) and (11)”
- After the software installed in computer, restart the system as mentioned in “Step (12)”.
- Refresh the amazon page as mentioned in “Step (13)” and my name was re-entered.
Screenshot of step “(14) and (15)”
- Browse the news website www.ndtv.com in both browsers, an unnecessary advertisement was blocked by “Adblock Plus”.
Screenshot of step “(16) and (17)”
b)
The following screenshots demonstrate the given steps:
- In “Step 1”, the website www.amazon.com was browsed in “Google Chrome” browser and minimized at right side of the window as mentioned in “Step 2”.
- Similarly, the same website was browsed in “Firefox” browser and minimized at left side of window as mentioned in “Step 3” and “Step 4”.
Screenshot of step “(1) (2) (3) and (4)”
- My name “John” has been searched in amazon search box as mentioned in “Step 5”
Screenshot of step “(5) and (6)”
- In “Firefox” menu, click on “Add-ons” and the “Get Add-ons” page has been opened.
Screenshot of step “(7) and (8)”
- Search the “Adblock Plus” on “Google” and install the latest version in Firefox browser.
Screenshot of step “(9) (10) and (11)”
- After the software installed in computer, restart the system as mentioned in “Step (12)”.
- Refresh the amazon page as mentioned in “Step (13)” and my name was re-entered.
Screenshot of step “(14) and (15)”
- Browse the news website www.ndtv.com in both browsers, an unnecessary advertisement was blocked by “Adblock Plus”.
Screenshot of step “(16) and (17)”
c)
The following screenshots demonstrate the given steps:
- In “Step 1”, the website www.amazon.com was browsed in “Google Chrome” browser and minimized at right side of the window as mentioned in “Step 2”.
- Similarly, the same website was browsed in “Firefox” browser and minimized at left side of window as mentioned in “Step 3” and “Step 4”.
Screenshot of step “(1) (2) (3) and (4)”
- My name “John” has been searched in amazon search box as mentioned in “Step 5”
Screenshot of step “(5) and (6)”
- In “Firefox” menu, click on “Add-ons” and the “Get Add-ons” page has been opened.
Screenshot of step “(7) and (8)”
- Search the “Adblock Plus” on “Google” and install the latest version in Firefox browser.
Screenshot of step “(9) (10) and (11)”
- After the software installed in computer, restart the system as mentioned in “Step (12)”.
- Refresh the amazon page as mentioned in “Step (13)” and my name was re-entered.
Screenshot of step “(14) and (15)”
- Browse the news website www.ndtv.com in both browsers, an unnecessary advertisement was blocked by “Adblock Plus”.
Screenshot of step “(16) and (17)”
Want to see the full answer?
Check out a sample textbook solutionChapter AE Solutions
Using MIS (10th Edition)
- Assume a web server can only receive TCP connections on port 80 (HTTP) and 22 (SSH), but not on any other ports. The web server can only establish connection to a database server hosted on private IP 192.168.100.100 on port 3000, but to no other machines inside or outside the network. Imagine this web server is running Linux, and we’re using iptables to define host-based firewall rules for it. Show the set of iptables commands to install necessary rules for this security policy.arrow_forwardShow how to use native authentication and authorization services when a web client wants to access resources on a web server that aren't open to the public. How do you know which two arguments in favor of layered protocols are the best? Give examples to back up what you say.arrow_forwardA URL that begins with "https" uses _________, which is a protocol that offers end-to-end encryption for secure transactions such as credit card purchases and online banking. Question 22 options: 1) DOS (Denial of Service) 2) VPN (Virtual Private Network) 3) DMZ (Demilitarized Zone) 4) TLS (Transport Layer Security)arrow_forward
- You have a client that has two servers that must transfer sensitive information between them across the network. The transfers of data must be encrypted so the information cannot be used if someone captures it as it traverses the network. What technology can you use? a. firewall b. BitLocker c. Kerberos d. IPsecarrow_forwardThe different types of DNS records need to be sorted out. Each of them will be briefly talked about, with specific examples and reasons for their use. In the same company, can you have the same hostname alias for both of your web servers?arrow_forwardUse a text editor to create Extended Access lists to accomplish the following tasks. Again no Packet Tracer is needed for this lab.: Allow only web traffic to the company web server with IP address 10.1.2.3. Allow connections from from any IP address to access the SMTP port on the email server with IP address 10.1.2.2, but deny any other traffic. Block well-known Distributed Denial of Service tcp ports 6669, 6711,6712,6713,6714, 16660.arrow_forward
- can someone help me with this? I. Use Wireshark to capture the traffic when you visit a website. Open the captured traffic Client Hello of the TLS protocol and take a screenshot of cipher suites initiated by the client (which is your browser) II. Check the traffic Server Hello of TLS protocol. Display the cipher suite offered by the server and explain how the cipher suite will protect subsequent HTTP traffics (Application Data) between your browser and the serverarrow_forwardIn this scenario, As you are aware that Bank Muscat is a leading bank in Sultanate of Oman. It tempts an attacker from Turkey. So, he is trying to initiate the session with Bank Muscat server by sending SYN/ACK packets rather than establishing the connection. Identify the protocol you would suggest for secure web browser communication between the Bank Muscat Client e to Bank Muscat Server Site? Justify your answer.arrow_forwardWeb clients must utilize the web server's built-in authentication and authorization services before they are granted access to the server's restricted areas. Does using layered protocols have any additional benefits? Whenever possible, use concrete examples to back up your claims.arrow_forward
- A.Which of the following protocols keeps all potential paths active while managing the flow of data across the paths to prevent loops? 1.TRILL 2.CARP 3.SPB 4.RSTParrow_forwardIn which of the following applications, UDP is a suitable transport layerprotocol? (a)In SMTP, a user can send a long e-mail message, which may includemultimedia. When a user sends a message, the recipient does not expectto receive a response quickly. (b)A user needs to download a very large text file from the internet. Theuser doesn’t want part of the file to be missing or corrupted when he/sheopens the file. The delay created between the delivery of the parts arenot an overriding concern for him. (c)In DNS, a client needs to send a short request to a server and to receive a quick response from it. The request and response can each fit in one userdatagram.arrow_forwardTo prevent a DHCP server from leasing an IPv4 address that has been manually configured on a computer on the network, you can configure a DHCP server to send one or more ping requests to an IPv4 address before leasing it. a. True b. False ?arrow_forward
- LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE LComptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage Learning