StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Answer Questions - Assignment Example

Cite this document
Summary
The username from this request is  and the password is.
You are periodically running vulnerability scans on your Web server…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Answer Questions
Read Text Preview

Extract of sample "Answer Questions"

Due: Computer sciences and Information technology: Question one What search string would you use with Google to locate a Web server that was offering up a directory listing of the /etc directory, including the password file?[Directory String] + (inurl:)[file type] + [limitors]Question two You are analyzing network traffic and you see the string dXNlcjpwYXNzd29yZA== in a Web request where the client is authenticating with the server. The username from this request is  and the password is.

Question three Before you embark on a penetration test, what is the very first thing you want to get?Reconnaissance- I should first identify publicly accessible services from the home network such as web servers or emails.Question four What type of scan are you running if you use the following? Nmap –sS 192.168.0.0/2?Port Scanning by ping sweeping using NmapQuestion five What tool would you use to get passwords on a voice over IP network? VoiPongQuestion six You find the following in Web logs.

 POST/scripts/postit. php?p=%3Ealert (document. Cookie ())%3C%2Fscript%3E. What is going on?It shows the URL is encoded using a custom scheme by the web and the javaScript is not isolated in the URL parameter.Short essay answer:Question seven Is a vulnerability scanner completely accurate and reliable? Why or why not?NO. Because vulnerability scanner will only identify the possible vulnerabilities based on other network responses that are not what they seem.Question eight You see someone using the command "nc www.google.com 80".

What is it they are trying to do?They are trying to test a transmission control protocol connection to a remote host (www.google.com) on port 80.Question nine Explain clearly, in your own words, what a buffer overflow is.Buffer overflow is a software bug that happens when sequence of instructions coded to a physical memory storage are overstored than intended.Question ten You are periodically running vulnerability scans on your Web server. One day it indicates to you that Firefox has a security vulnerability that could allow for a privilege escalation.

How concerned are you about this finding? Include your reasoning.These vulnerabilities are caused by errors in Mozilla maintenance service when interacting with local programs. This may result to security breach as attackers may conduct some spoofing attacks by using special modified URI. I will counteract this by either upgrading the Mozilla or scanning various server ports.Multiple choicesQuestion eleven Which of the following technologies are CLIENT side?HTML HTTP PHP Flash Perl HTML and HTTPQuestion twelve Which of the following technologies are SERVER side?

JavascriptHTTPPHPRubyHTML PHP, Ruby, JavaScipt Works cited Stephen Northcutt, Jerry Shenk, Dace Shackleford, Rim Rosenberg, Raul Siles and Steve Mancini. “Penetration Testing: Assessing Your Overall Security Before Attackers Do.” 2006. PDF File

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Answer Questions Assignment Example | Topics and Well Written Essays - 250 words - 4”, n.d.)
Answer Questions Assignment Example | Topics and Well Written Essays - 250 words - 4. Retrieved from https://studentshare.org/information-technology/1642081-answer-questions
(Answer Questions Assignment Example | Topics and Well Written Essays - 250 Words - 4)
Answer Questions Assignment Example | Topics and Well Written Essays - 250 Words - 4. https://studentshare.org/information-technology/1642081-answer-questions.
“Answer Questions Assignment Example | Topics and Well Written Essays - 250 Words - 4”, n.d. https://studentshare.org/information-technology/1642081-answer-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Answer Questions

Summarize the article provided into one page

Everyone was curious and scientists set out to Answer Questions and find solutions.... There was curiosity, skepticism, and a plethora of questions.... In his article, “How to Defend Society Against Science,” Paul Feyerabend divulges into the concept that science is just another ideology and should be treated as such....
1 Pages (250 words) Essay

Ethics Case Studies

There was even deception because Laud Humphreys surreptitiously followed some unwilling participants to their houses in order to get them to Answer Questions on the pretext that they were answering them for a different study.... Admittedly, in the present paper, the author answers some questions regarding the ethicality of three experiments: the Tearoom Sex Study, the Milgram Experiment, and the Tuskegee Syphilis Study.... Ethical Case Studies: questions and Answers in Research Ethics In this paper, the answers some questions regarding the ethicality of three experiments: the Tearoom Sex Study, the Milgram Experiment, and the Tuskegee Syphilis Study....
2 Pages (500 words) Essay

Organizational Communication

He displayed great willingness and enthusiasm to Answer Questions quickly and on the spot (p.... He encouraged them to ask questions or complaints either directly or through a fishbowl kept in the companys cafeteria.... According to Jane Callanan, Jim Sims after being appointed as the new CEO at CTP focused mainly on uplifting the morale of the employees and rebuilding their lost trust in the management....
1 Pages (250 words) Assignment

Developing Listening and Speaking Skills

fter teaching, learners should be allowed to ask and Answer Questions as means to gauge their level of understanding on the items taught during a session.... The teacher can narrate an interesting stories and then ask relevant questions expecting positive response to test their understanding (Pye and Greenall, Developing Listening and Speaking Skills Developing Listening and Speaking Skills It is beyond question that through having many opportunities to talk as well as to listen to peers that children gain language skills so valuable for their success in reading and writing....
2 Pages (500 words) Essay

Recruitment of Sales Representatives

hellip; Al Khor should design an interview which features questions highlighting the applicant's moral standard.... The paper "Recruitment of Sales Representatives" discusses that the recruitment of two new sales representative should undergo a process which will enable Al Khor to choose among its numerous employees the one who posses all the competencies required for the position....
6 Pages (1500 words) Case Study

Strategies for Multilingual Education

This essay "Strategies for Multilingual Education" focuses on bilingual education, a common aspect of the education system in various parts of the world.... Teachers find it difficult to establish an unbiased criterion for handling children who speak English as a second language.... nbsp;… Language diversity is a familiar aspect of American education....
5 Pages (1250 words) Essay

Art and Pornography

The "Art and Pornography" paper examines the difference between non-pornographic and pornographic images, the Walt Disney cartoon "Der Fuehrers Face or Donald Duck in Nazi Land", and the aspect of selfhood that Cindy Sherman and Nikki Lee were examining in their work.... hellip; The most important instance of the gaze in this scenario is when the viewer meets the gaze of the woman on the right....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us