Essay Available:
You are here: Home → Coursework → Technology
Pages:
1 page/≈275 words
Sources:
Level:
MLA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.29
Topic:
Computer sciences and Information technology (Coursework Sample)
Instructions:
Answer Questions in this file as required.
source..Content:
Student's Name:
Tutor's Name:
Course:
Date Due:
Computer sciences and Information technology:
Question one
What search string would you use with Google to locate a Web server that was offering up a directory listing of the /etc directory, including the password file?
[Directory String] + (inurl:)[file type] + [limitors]
Question two
You are analyzing network traffic and you see the string dXNlcjpwYXNzd29yZA== in a Web request where the client is authenticating with the server. The username from this request is  and the password is.
Question three
Before you embark on a penetration test, what is the very first thing you want to get?
Reconnaissance- I should first identify publicly accessible services from the home network such as web servers or emails.
Question four
What type of scan are you running if you use the following? Nmap –sS 192.168.0.0/2?
Port Scanning by ping sweeping using Nmap
Question five
What tool would you use to get passwords on a voice over IP network?Â
VoiPong
Question six
You find the following in Web logs. POST/scripts/postit. php?p=%3Ealert (document. Cookie ())%3C%2Fscript%3E. What is going on?
It shows the URL is encoded using a custom scheme by the web and the javaScript is not isolated in the URL parameter.
Short essay answer:
Question seven
Is a vulnerability scanner completely accurate and reliable? Why or why not?
NO. Because vulnerability scanner will only identify the possible vulnerabilities based on other network responses that are not what they seem.
Question eight
You see someone using the command "nc  80". What is it they are trying to do?
They are trying to test a transmission control protocol connection to a remote host () on port 80.
Question nine
Explain clearly, in your own words, what a buffer overflow is.
Buffer overflow is a software bug that happens when sequence of instructions coded to a physical memory storage are overstored than intended.
Question ten
You are periodically running vulnerability scans on your Web server. One day it indicates to you that Firefox has a security vulnerability that could allow for a privilege escalation. How concerned are you about this finding? Include your reasoning.
Tutor's Name:
Course:
Date Due:
Computer sciences and Information technology:
Question one
What search string would you use with Google to locate a Web server that was offering up a directory listing of the /etc directory, including the password file?
[Directory String] + (inurl:)[file type] + [limitors]
Question two
You are analyzing network traffic and you see the string dXNlcjpwYXNzd29yZA== in a Web request where the client is authenticating with the server. The username from this request is  and the password is.
Question three
Before you embark on a penetration test, what is the very first thing you want to get?
Reconnaissance- I should first identify publicly accessible services from the home network such as web servers or emails.
Question four
What type of scan are you running if you use the following? Nmap –sS 192.168.0.0/2?
Port Scanning by ping sweeping using Nmap
Question five
What tool would you use to get passwords on a voice over IP network?Â
VoiPong
Question six
You find the following in Web logs. POST/scripts/postit. php?p=%3Ealert (document. Cookie ())%3C%2Fscript%3E. What is going on?
It shows the URL is encoded using a custom scheme by the web and the javaScript is not isolated in the URL parameter.
Short essay answer:
Question seven
Is a vulnerability scanner completely accurate and reliable? Why or why not?
NO. Because vulnerability scanner will only identify the possible vulnerabilities based on other network responses that are not what they seem.
Question eight
You see someone using the command "nc  80". What is it they are trying to do?
They are trying to test a transmission control protocol connection to a remote host () on port 80.
Question nine
Explain clearly, in your own words, what a buffer overflow is.
Buffer overflow is a software bug that happens when sequence of instructions coded to a physical memory storage are overstored than intended.
Question ten
You are periodically running vulnerability scans on your Web server. One day it indicates to you that Firefox has a security vulnerability that could allow for a privilege escalation. How concerned are you about this finding? Include your reasoning.
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- ChlorineDescription: Chlorine is an element that is a chemical in nature. The chemical symbol for Chlorine is cl, and it has an atomic number...5 pages/≈1375 words| MLA | Technology | Coursework |
- Cyber-Bullying EssayDescription: Bullying is a by-product of the capitalist society that advocates for personal advancement over any other goals...6 pages/≈1650 words| MLA | Technology | Coursework |
- Leadership in the Aviation IndustryDescription: Why do the airlines seem to receive all of the attention when general aviation is actually the largest segment of aviation?...3 pages/≈825 words| MLA | Technology | Coursework |