Drop Send Turn off Unknown Syslog Port Frames Protect Restrict Shutdown
Q: Active network connections are listed by the Linux and Windows netstat tools. Describe how to use…
A: "netstat" is an abbreviation for "network statistics." A LINUX/WINDOWS command displays the number…
Q: In a Fedora system encrypt a file using the gpg2 utility and a symmetric key. {Enter the command…
A: Note: The answers of the first three subparts are given. Introduction: Fedora is a Linux…
Q: The netstat command (available on Linux and Windows) displays a computer's active network…
A: Netstat is a command which is used in LINUX or WINDOWS to display the number of incoming and…
Q: Configuration Task Command Syntax Switch(config)# hostname name No. 2 tta the nege U epassword…
A: 3. Configuration Task :- encrypting all clear text password Command syntax:- the command _service…
Q: 1. create an auto scaling group with that launch template. Link the new created auto scaling group…
A: Answer is given below-
Q: Pseudocode Port Scanner INPUT : IPv4 address with its port range TASK/function : Try the Internet…
A: Algorithm: Start the program. Read the IP address from user. Check whether IP address is valid. Find…
Q: g. found = 0; in.open( "a:client.dta:, ios:binary); in.read((char*)&client, sizeof(client)); while(…
A: In case of multiple questions, we are only allowed to answer first one. In this case since we do not…
Q: inux LDAP server question Write exact step by step commands Configure also I also need commands
A: I have assumed the following system configuration: 1. Go into Single User mode andset the root…
Q: Session data will not be available once the user logged out.
A: Please find the answer below :
Q: Which setting controls access to shared files when users are disconnected from a network? Select…
A: Here the given options are caching, permission level, permissions and shared nodes snap-in . All…
Q: 83. A _______________ configuration can make takeover by the backup site almost instantaneous. a.…
A:
Q: Session data will be available once the user closed the web browser. a. FALSE O b. TRUE
A: The session is a variable of type global which is stored on the server. Refer to step 2 for the…
Q: simple web application with 3 pages: 1- login 2- logout 3- content We the user login, the app…
A: the code is an given below :
Q: What must you do to transform your computer into a DNS server? (Choose all thatapply.)a. Create zone…
A: A namespace that organize and manages hierarchy for the purpose of identifying computers networks.…
Q: A (n)_________is any computer that provides services and connections to other computers on a…
A: A (n)__Host_______is any computer that provides services and connections to other computers on a…
Q: In Kali Linux using program proxychains. describe steps and show how to configure it and use it to…
A: In Kali Linux using program proxychains. describe steps and show how to configure it and use it to…
Q: amming The .sh script can be run with either 0, 2, 3, or 5 command-line arguments. As a basic…
A: Penetration programming The .sh script can be run with either 0, 2, 3, or 5 command-line arguments.…
Q: Q12- Choose the correct values for the sequence numbers A,B,C and the Acknowledgment number D shown…
A: Answer: I have given answer in the brief explanation
Q: Oluseyi receives a link to a free download of a premium application in his email. He clicks the link…
A: - We need to highlight the option which shows the changed MD5 value of the file. - The first…
Q: GitHub Script automatically handles authentication to GitHub API. Select Yes if the statement is…
A: Answer : No.
Q: 6.Cookies can real private information and track visitors' behaviors. Which of the following cookies…
A: Session cookies are cookies that memorize your online activities temporarily. These cookies will be…
Q: Q12. The file /etc/resolv.conf configures access to a DNS server. True/false. Q13. Cardctl is…
A: these questions are based on commands and dns server in computer science.
Q: In computers, what is the compressed form of the Microsoft Developer Network (MSDN)?
A: The compressed form of the Microsoft Developer Network (MSDN) this solution :
Q: DT_ATC_RS3 (config)# username techadmin password 63t0ut0fh3r3! DT ATC_RS3 (config) # enable secret…
A: It will not promt anything as it is only create password encryption. It will also not deny access…
Q: What are the drawbacks of using session?
A: Session: Session is just the way to save the information of a website in a server itself so that can…
Q: conhection timed out; no servers la bè Pea @arya:~$ DNS cache poisoning has happem Your workstation…
A: Lets see the solution.
Q: Explain in OWN words how cookies can show that a user has visited a site if that user's history has…
A: COOKIES - It is a small program in the form of text file which stores data about the users such…
Q: You installed your new Windows Server 2012, but after the first day, the server was compromised by a…
A: d.All of the above
Q: The _______ calls certain procedures on remote systems and is used to perform synchronous or…
A: The correct option is B. B. RPC The RPC calls certain procedures on remote systems and is used to…
Q: remote ob those rem
A: Explain why activation is much better than pre-loading remote objects?
Q: UDP Task In the program explained during the lab, in the client side The OS assigns the port…
A: The first question will be solved for UDP, please upload another question again. Steps: Server side…
Q: Router: your first name switch: last name user: first name with encrpted pass class12345 secure all…
A: There are two switches on a router. 1st IP Address = 192.168.4.0/28 (PC1 and PC2) and available PC…
Q: Brute Attack on FTP server (KALI -LINUX) The file you downloaded contains the 100 most common…
A: This question belongs to Kali Linux and is further solved below
Q: The Linux and Windows netstat tool lists active network connections. Explain how to use this command…
A: To see what's going on with your network, type "netstat" into Network statistics are referred to as…
Q: One of the best security practices when using Linux is to disable direct root login Via SSH.
A: “Since you have asked multiple question, we will solve the first question for you. If you want any…
Q: Configure the switch S1 as per below & write the command in the answer text window Configure the…
A: Configure the host name for the switch Here enable command enables privileged EXEC mode.…
Q: Session data will not be available once the user logged out. O a. TRUE O b. FALSE
A: Answers: 1) True 2) False
Q: Which destination port number does a TFTP client use to transfer files over the network?
A: TFTP It is a simple protocol used for transferring files, executed on top of the UDP/IP protocols…
Q: Create a new user on your pfsense system a. User: Remote Password: Remote1 b. Full name: Remote User…
A: To add new user in pfsense system Navigate to system -> User management Click on Add There will…
Q: Emulates the behavior and functionality of real system with another method False O True the Session…
A: Emulates the behavior and functionality of real system with another method The Answer is: TRUE
Q: 5. Code that catch the connection error if vb.net failed to connect in mysql database…
A: Code that catch error in Vb.net when there connection fail to connect in mysql database
Q: The NET command has many usages, including the following:
A: NET Command: The Microsoft NET command is a must know for administrators. It adds or delete the…
Q: ttps://view.officeapps.live.com/op/view.aspx?src=https://lms-asm.moe.gov.ae/api/Files/GetFile/822bbd…
A: Hi and thanks for your question! Unfortunately it looks incomplete. Please resubmit the question…
Q: UDP Task In the program explained during the lab, in the client side The OS assigns the port…
A: 1. client.py from socket import *import sysserverIP = '127.0.0.1' serverPort = 12000clientSocket =…
Q: You can have many forms in a project * created in Visual Basic application True False The user can…
A: Fault tolerance is ability to handle process even in case of few components failure.
Q: "Quit" is a command which can be used for O disconnect the FTP client running only. O Disconnect…
A: The question is on choosing the correct option which identifies the working of "Quit" command.
Step by step
Solved in 2 steps
- UDP Task In the program explained during the lab, in the client side The OS assigns the port number automatically. The client sends a line of characters (data) from its keyboard to server. Update the client side of program so that it takes 2 arguments The port it will bind to. The message that will be sent to the server. Keep the server side of program as it is Use the screenshots in the presentation as a reference check the testArg.py --> an example to show you how to use arguments TCP Task In the program explained during the lab the client sends only 1 message to server ‘hello from tcp client’ server responds with the uppercase message. Update the program / make a simple chat program so that Client can send/receive multiple messages to server. A special exit message is used to disconnect ‘Exit’. Each time client sends a message, server responds with a confirmation of receiving it and its length (use the screenshots in the presentation as a reference)…UDP Task In the program explained during the lab, in the client side The OS assigns the port number automatically. The client sends a line of characters (data) from its keyboard to server. Update the client side of program so that it takes 2 arguments The port it will bind to. The message that will be sent to the server. Keep the server side of program as it is Use the screenshots in the presentation as a reference check the testArg.py --> an example to show you how to use arguments TCP Task In the program explained during the lab the client sends only 1 message to server ‘hello from tcp client’ server responds with the uppercase message. Update the program / make a simple chat program so that Client can send/receive multiple messages to server. A special exit message is used to disconnect ‘Exit’. Each time client sends a message, server responds with a confirmation of receiving it and its length (use the screenshots in the presentation as a reference)…Q1) Which task is performed by the dynamic routing protocols? * a. discover end devices O b. update routing tables O c. propagate host gateways O d. assign automatic IP addressing Q2) Which of the following is a static routing feature? * a. Security increases because only the network administrator may change the routing tables. O b. Configuration complexity decreases as network size increases. O c. Routing updates are automatically sent to neighbors. O d. Routing traffic load is increased when used in stub network links
- penetration programming Modify the .sh script so that it also works interactively. Specifically, if no hostname is given on the command line, the program should interactively ask for a hostname, starting port, and ending port with three separate prompts, and carry out its scan using those values. After scanning finishes, the program should loop to receive another set of values, stopping only when the user enters a blank host name. If this feature is implemented properly, it will also allow you to run the script in ’batch’ mode, by “piping in” a plain text file with the hostname on the first line, start port on the second, stop port on the third, and repeating for as many hosts as you wish to scan. For example, if a file named hosts_to_scan.txt contains a list of hosts and ports in the proper format, the program should now work as follows: cat hosts_to_scan.txt | ./portscanner.sh The timeout argument should still work in this case as well: cat hosts_to_scan.txt | ./portscanner.sh -t 3…Q4) Which event will take place if there is a port security violation on switch S1 interface Fa0/1, as given below? * S1# show port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action (Count) (Count) (Count) Fa0/1 2 restrict A. A notification is sent B. A syslog message will be logged C. Packets with unknown source addresses won't be dropped D. The interface will go into error- disabled stateComputer Science Control an LED Remotely using TCPDUMP Must be implemented on the RPI 3B+ using a shell script. -In this project, write a shell script that when the PI receives a ping command with a specific byte pattern then it must turn on or off an LED. For example, if the ping command’s pattern is “aa ae” then the PI must turn on the LED. If the ping command’s pattern is “ab ae” then the PI must turn off the LED. If the ping command’s pattern is anything else, then the PI should do nothing and only print on the terminal that a PING message was just received.
- 7. Manage open and closed ports on the server from the client terminal (remember ssh).Penetration programming The .sh script can be run with either 0, 2, 3, or 5 command-line arguments. As a basic sanity check, Your program should test at the beginning that the number of arguments given is one of these. If not, the user has entered something incorrectly, and the script should output the error message Usage: ./portscanner.sh [-t timeout] [host startport stopport], and immediately exit. .sh #!/bin/bash # Basic bash port scanner # CHECKING CONDITION FOR -t OPTIONif [ "$1" == '-t' ]; then# IF -t IS USED time=$2 host=$3 startport=$4 stopport=$5else# IF -t IS NOT USED time=2 host=$1 startport=$2 stopport=$3fi function pingcheck{pingresult=$(ping -c 1 $host | grep bytes | wc -l)if [ "$pingresult" -gt 1 ]; then echoelse echo "$host is down, quitting" exitfi} function portcheck{# IF TIMEOUT VALUE OF LESS THAN 1if [ "$time" -lt 1 ]then echo "Timeout value must be greater than 0, quitting" exit# IF TIMEOUT VALUE IF NOT EQUAL TO 2elif […TCP: the client sends only 1 message to the server ‘hello from TCPclient’ and the server responds with the uppercase message. Update the program / make a simple chat program so that The client can send/receive multiple messages to the server. A special exit message is used to disconnect ‘Exit’. Each time client sends a message, the server responds with a confirmation of receiving it and its length. UDP: in the client-side The OS assigns the port number automatically. The client sends a line of characters (data) from its keyboard to the server. Update the client-side of the program so that it takes 2 arguments The port it will bind to. The message that will be sent to the server. Keep the server-side of the program as it is. check the testArg.py --> an example to show you how to use arguments make this 2 socket programming program in python in detail and show the output.
- The URL Connection class can be used to read and write data to the specified resource referred by the ReadableByteChannel Select one: True FalseComputer Science Scenario: Using the iptables command, create a firewall for the local system that meets the following objectives, at least one identity-tagged screenshots are needed for each step: Allows incoming connections for the SSH and FTP ports from any system Allows incoming connections for the telnet port for any system in the 192.168.1.0/24 network Logs all other incoming connections Drops all other incoming connections by changing the default policy Note: Do not save the changes you make during this lab exercise.Consider the set of configuration commands shown in the picture below. What will be the final prompt that you will see? >enable #configure terminal #hostname Si #line console 0 O a. S1(config)# O b. S1(config-line)# O c. S1(config-console)# O d. S1(config-if)#