Sign In
Not register? Register Now!
You are here: HomeCourseworkTechnology
Pages:
1 page/≈275 words
Sources:
No Sources
Level:
MLA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.83
Topic:

Computer sciences and Information Technology: Networking (Coursework Sample)

Instructions:

networking quiz

source..
Content:
Student’s Name:
Tutor’s Name:
Course:
Date Due:
Computer sciences and Information technology:
Question one
What search string would you use with Google to locate a Web server that was offering up a directory listing of the /etc directory, including the password file?
[Directory String] + (inurl:)[file type] + [limitors]
Question two
You are analyzing network traffic and you see the string dXNlcjpwYXNzd29yZA== in a Web request where the client is authenticating with the server. The username from this request is  and the password is.
Question three
Before you embark on a penetration test, what is the very first thing you want to get?
Reconnaissance- I should first identify publicly accessible services from the home network such as web servers or emails.
Question four
What type of scan are you running if you use the following? Nmap –sS 192.168.0.0/2?
Port Scanning by ping sweeping using Nmap
Question five
What tool would you use to get passwords on a voice over IP network? 
VoiPong
Question six
You find the following in Web logs. POST/scripts/postit. php?p=%3Ealert (document. Cookie ())%3C%2Fscript%3E. What is going on?
It shows the URL is encoded using a custom scheme by the web and the javaScript is not isolated in the URL parameter.
Short essay answer:
Question seven
Is a vulnerability scanner completely accurate and reliable? Why or why not?
NO. Because vulnerability scanner will only identify the possible vulnerabilities based on other network responses that are not what they seem.
Question eight
You see someone using the command "nc  80". What is it they are trying to do?
They are trying to test a transmission control protocol connection to a remote host () on port 80.
Question nine
Explain clearly, in your own words, what a buffer overflow is.
Buffer overflow is a software bug that happens when sequence of instructions coded to a physical memory storage are overstored than intended.
Question ten
You are periodically running vulnerability scans on your Web server. One day it indicates to you that Firefox has a security vulnerability that could allow for a privilege escalation. How concerned are you about this finding? Include your reasoning.
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Microsoft Corporation
    Description: The Greatness Invention: Microsoft Bill Gates was born in Seattle on October 28, 1955, to his parents, Mary and William Gates II...
    6 pages/≈1650 words| 13 Sources | MLA | Technology | Coursework |
  • Different types of Ohmmeters
    Description: Multi range ohm meters: Multirange ohmmeters can measure a wide range of resistance values. ...
    1 page/≈275 words| 1 Source | MLA | Technology | Coursework |
  • Video Games and Its Components
    Description: Video game is software that is used for entertainment, playing games and stimulation...
    4 pages/≈1100 words| MLA | Technology | Coursework |
Need a Custom Essay Written?
First time 15% Discount!