Free

Answer Questions - Assignment Example

Comments (0) Cite this document
Summary
You are analyzing network traffic and you see the string dXNlcjpwYXNzd29yZA= in a Web request where the client is authenticating with the server. The username from this request is   and the password is .
Buffer flow occurs when data in a temporary storage exceeds…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Answer Questions
Read TextPreview

Extract of sample "Answer Questions"

Question & Answers Fill the blank What search string would you use with Google to locate a Web server that was offering up a directory listing of the /etc directory, including the passwd file. ……………………….
inurl:”powered by” site:test.com
2. You are analyzing network traffic and you see the string dXNlcjpwYXNzd29yZA== in a Web request where the client is authenticating with the server. The username from this request is   and the password is .
User:password
Questions :

3. Before you embark on a penetration test, what is the very first thing you want to get?
Establishing and Agreeing upon the rules of the engagement with the target system is needed before embarking on a penetration test.
4. What type of scan are you running if you use the following? nmap -sS 192.168.0.0/24
It scans the 256 addresses between 192.168.0.0 and 192.168.0.255. It checks what software is running on every up host. It also needs the root privileges because of OS detection and SYN scan.
5. What tool would you use to get passwords on a voice over IP network? 
Cain and Abel is a window base password recovery protocol, which cracks passwords of networks and recovers the VoIP conversation. It also includes many other features beyond the password cracking.
6. You find the following in Web logs. 
POST /scripts/postit.php?p=%3Cscript%3Ealert(document.cookie())%3C%2Fscript%3E
What is going on?
This is injection which means disabling of JavaScript for both HTTP Get and Post requests. Popup window will contain the cookie values.
Answer these question clearly .
7. Is a vulnerability scanner completely accurate and reliable? Why or why not?
Vulnerability scanner is completely accurate as it has become a mature industry. It provides network security and timely remediation.
8. You see someone using the command "nc www.google.com 80". What is it they are trying to do?
TCP service is being tested
9. Explain clearly, in your own words, what a buffer overflow is.
Buffer flow occurs when data in a temporary storage exceeds than the intended to hold the data. Buffers also hold the finite amount of the data. Additional information overflows in the adjacent buffer and overwrites the data held in the neighboring buffers.
10. You are periodically running vulnerability scans on your Web server. One day it indicates to you that Firefox has a security vulnerability that could allow for a privilege escalation. How concerned are you about this finding? Include your reasoning.
Various vulnerabilities are found in the Mozilla Firefox, such as SeaMonkey and Thunderbird that allows for the remote code execution. Exploitation of these vulnerabilities result into a risk that an attacker gains the privileges as someone logged on user uses. Attacker can also get the session of the authentication credentials. Attacker can install the programs and delete, change and create the data as well as new accounts.
Multiple choices
11. Which of the following technologies are CLIENT side?
JavaScript No
HTML Yes
HTTP No
PHP No
Flash Yes
Perl No
12. Which of the following technologies are SERVER side?
Java script yes
HTTP Yes
PHP Yes
Ruby No
HTML No Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Answer Questions Assignment Example | Topics and Well Written Essays - 250 words - 3”, n.d.)
Retrieved from https://studentshare.org/information-technology/1641992-answer-questions
(Answer Questions Assignment Example | Topics and Well Written Essays - 250 Words - 3)
https://studentshare.org/information-technology/1641992-answer-questions.
“Answer Questions Assignment Example | Topics and Well Written Essays - 250 Words - 3”, n.d. https://studentshare.org/information-technology/1641992-answer-questions.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Answer Questions

Answer questions

... English Questions Should we use Acronyms/Abbreviations on writing? Chuck them? Does their use help or hinder a reader-centered document? If we use them, how would they be deployed? In English, it is important sometimes to use Acronyms/ Abbreviation in course of writing because they tend to make reading easier. Long words often create a boring atmosphere when one reads a given writing and hence may lose concentration of the general story line. In having the use of abbreviations tends to help in maintaining one’s concentration in the event of reading a given literature. Chucking Acronyms may not serve good justice to the readers. They therefore help in a reader-centered document. 2. For our cover pages: What will be our logo... English...
1 Pages(250 words)Assignment

Answer questions

...1. (i) Why have Japanese firms, once dominant in the electronics industry, fallen behind competitors such as Samsung, Apple, and Amazon? Japan, whichonce dominated the consumer electronics business, is now facing stiff competition from various other companies such as Apple, Google and Samsung. These companies have focused on easy-to-use software and integration with other online services, cashing on faster improvement and using smart marketing strategies in every country. The past fiscal year saw electronics giant Apple and Samsung take a 20% share in the Japanese market, the highest over the past years when there were no foreign products in market. Experts believe that Japanese manufactures failed to analyze the consumer... (i) Why have...
2 Pages(500 words)Admission/Application Essay

Answer questions

... Explain how Daimler AG used BI to improve its relationship with s. In order to increase its market competitiveness, Daimler AG has embarked on Business Intelligence. For once, BI enables the company to identify the different needs of not only their existing customers but potential ones as well. By so doing, the company is able to cater to the needs of a wide variety of the population; hence, increasing its customer base. The company has been focusing on what customers give value to and what they miss in the transport sector. This enables Daimler AG to find opportunities to become innovative. Therefore, through the use of BI, Daimler AG is able to relate better with its customers as it can tell their needs and attend to them... Explain how...
1 Pages(250 words)Book Report/Review

Answer questions

... Governor O’Malley enjoys a lot of support is and is a type of generic dem which can be agreed upon by the party. Governor O’Malley generally checks majority of the correct boxes with the right individuals and he would surely give Mrs. Clinton a run for her money and fame. This will negatively affect Clinton’s run and she could even lose the ticket to presidential contest (Hess, 2014). 2. President Obama is delaying in executive action on new illegal immigrants because of political concerns. The president apparently believes that the action right now is not sustainable and is calling upon the congress to initiate steps that will overhaul America’s immigration laws. 3. The foreign policies issues Mr.Obama is facing have created... Governor...
1 Pages(250 words)Essay

Answer Questions

... Lessons and work for project preparation Source one: Big Data Analytics Using Splunk The source provides lessons on thefundamental basis of big data and the different mechanisms in processing and analyzing data including Splunk. Various aspects including unstructured data characterize big data explained in the source, which is an important lesson in managing data. Although the source provides a number of alternative data processing techniques, the most important knowledge I expect to acquire from the book is the use of time-series indexer (Splunk) to monitor, audit active directory, report, and view events in a networking environment. Notably, Splunk development was meant for machine data, but can also be used to analyze big... Lessons and ...
1 Pages(250 words)Essay

Answer Questions

...ADDICTION IN YOUNG CHILDREN Lecturer’s Based on the risk factors identified, what do you think can be done to preventthe development of addiction in young people? For the young people, the utilization of alcohol and drugs before the brain has fully developed increases the child risks of future addiction to drug intake. Having an addict parent or close relatives increases the probability of the child being an addictive to. Children who grow in families suffering from problems of drug addiction such as alcohol suffer from a number of social, psychological and learning difficulties such as lack of good parental care, insufficient physical and psychological safety, undeveloped life skills and will later develop communication problems... IN YOUNG...
1 Pages(250 words)Assignment

Answer questions

...Facing Our Mistakes by David Hilfiker Facing Our Mistakes by David Hilfiker The narrative that begins the essay is a heartrending one and provides examples of mistakes that physicians can make. Yet, critics argue that the narratives prove David Hilfiker is incompetent. What is your initial viewpoint? To error is human and any human being can be fallible. David Hilfiker can’t be described as incompetent due to the mistakes he committed; on the contrary I think he is competent enough from the fact that he admits his mistakes. 2. Does the narrative (presenting his mistakes) work to create him as an authority on mistakes? or does it undermine his argument? The narrative work does create David Hilfiker as an authority on mistakes... Our Mistakes ...
1 Pages(250 words)Essay

Answer questions

... Task The black women have been sidelined in the American society for quite some time, although they have made up the national agendas during elections. For instance, there are more women dying from laboring process and during the gestation period for the fact that the facilities and attention given to this person are minimal. The poor response to their needs has been attributed to the fact that they have a poor representation in the national major commissions that are responsible for acting on the issues (Siegel et al., Pg 15). Task 2 National mood National mood is a situation whereby the whole nation has a particular opinion on an issue or politician. The whole nation tends to have a similar opinion on issues and affects... Task The...
2 Pages(500 words)Admission/Application Essay

Answer questions

...1. What are the motivations for male chimpanzees to hunt? What benefits do being a good hunter, and being a high ranking member of the male hierarchy, have for passing on of the male’s genes? First is for is to live and nutrition. Chimpanzees just like any living animals has to eat. Meat is essential for their nutrition and energy particularly the meat from red colombus monkey. Male monkeys are also motivated to hunt because it gains them access to female chimpanzees and being high ranking of the male hierarchy allows more access for female chimpanzees allowing a greater chance for the male’s genes to be passed. 2. What do the monkeys raised without a mother tell us about the importance of parenting among primates... What are the...
1 Pages(250 words)Essay

Answer questions

...Anthropology read page 198 “Chimpanzee Predators” and answer the following question: What are the motivations for male chimpanzees to hunt? What benefits do being a good hunter, and being a high ranking member of the male hierarchy, have for passing on of the male’s genes? The male Chimpanzees do meat hunting, but they share it with non-hunting females. Male Chimpanzees hunt for meat so that they can get access to the females, more so, the fertile ones. Males in a given hunting group always equal the available productive female chimpanzees that will share the meat. Males that are good hunters control their hunting groups and interact a lot with fertile females. The genes for goo hunters get passed on to...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Answer Questions for FREE!

Contact Us