Question 2 ( Listen MC11: What is the following Snort command for? snort -i 3 -c c:\snort\etc\snort.conf -T Test if snort works in terms of detecting attacks Check if snort has a configuration file Capture packets from network interface 3 Validate Snort configuration
Q: Describe the methods of user support, such as help desks and user training.
A: The following will be discussed about user support procedures like user training and help desks: The…
Q: Explain the difference between a simple CAV system and a multiple zoned recording system.
A: Magnetic Disk A disk is a spherical platter made of a nonmagnetic substance called as substrate…
Q: Briefly define the seven RAID levels.
A:
Q: How do the CISC instruction sets compare to the original RISC ones?
A: Given: Compare the original RISC instruction set with CISC.
Q: A programmer wants to create a method that is called yesNo. The method receives a String and an…
A: The correct answer is given below with explanation
Q: 6). The reduced instruction set computer reduces the operational time by shortening the clock cycle…
A: RISC or Reduced Instruction Set Computers are actually those computers that actually make the…
Q: Give an example of a situation in which multicast addresses might be beneficial.
A: The multicast address identifies the group of hosts sharing the address. Multicast address are not…
Q: Which of the studied data structures in this course would be the most appropriate choice for the…
A: Solution:: Ans .Data Structure : HASH TABLE REASON FOR SELECTING HASH TABLE DATA STRUCTURE :…
Q: What does virtual circuit network connection status information mean? What rate does the forwarding…
A: Given: The term "virtual circuit" (VC) refers to a method of moving data across a packet-switched…
Q: time got wrong answer. Don't make copy
A: I have answered below:
Q: wb wi kjb mk rmit bmiq bj rashmwk rmvp yjeryrkb mkd wbi iwokwxwvmkvr mkd ijyr ynib urymwk…
A: #include<iostream> #include<string> #include <math.h> using namespace std;…
Q: Please provide me a C program that prints the message "C Programming." in the output 10 times using…
A: Requirement: Write a C program that prints the message "C Programming." in the output 10 times using…
Q: Write a Python program to display the hex values in string format of all elements of the list given…
A: Step-1: Start Step-2: Declare a list num with values [11,22,33,44,55] Step-3: Start a loop in i in…
Q: Label the Recursion Requirements. int fact (int n) { int result; } if(n==1) return 1; result = fact…
A: ANSWER:
Q: / A A user is executing a tracert to a remote device. At what point would a router, which is in the…
A: A user is executing a tracert to a remote device. At what point would a router, which is in the path…
Q: Adding a derived class to a base class requires fundamental changes to the base class A. True B.…
A: -Inheritance is a process in which new classes are created from the existing classes. -New class…
Q: What is the difference between realloc() and free()?
A:
Q: Popular social networks like Facebook and Twitter attract a lot of people. Determine whether they…
A: Introduction: Through dyadic relationships, information sharing, and engagement, social networks are…
Q: Consider relation R(A,B,C,D,E,F) with functional dependencies: {C,D,E)→ {B} (A,C,D] → [F] [B,E,F] →…
A: The following solution is
Q: What differences in traffic patterns account for the fact that STDM is a cost-effective form of…
A:
Q: Describe the most important aspects of analog, digital, and hybrid computer architectures
A: Introduction: This questions explains Analog Computers, Digital Computers, and Hybrid Computers.
Q: 2.) What is the binary floating-point representation of decimal 22.75? Show all eight steps.…
A: Given decimal number is: 22.75 To convert the decimal number into floating point representation,…
Q: Give a brief definition of machine language. Please also explain why English is not understood by…
A: ANSWER:-
Q: Consider how important wireless networks are in today's countries that are still developing.…
A: Introduction Billions of individuals currently approach the Internet and can take part in the…
Q: Salesforce Case Study 4: Suppose that in you Salesforce Developer Org there is an custom object…
A: Apex trigger: Apex triggers allow you to perform custom actions on Salesforce records before or…
Q: Write a C program using switch statement. The program will read a character (op) and will calculate…
A: Step-1: Start Step-2: Declare an variable op , r, v, pi=3.14 Step-3: Take input from user and store…
Q: what is the difference between python and java
A: Please find difference between python and java in below step.
Q: What common characteristics are shared by all RAID levels?
A:
Q: Suppose an 8-bit data word stored in memory is 11000010. Using the Hamming algorithm, determine what…
A:
Q: Give an example code for bold text tag in html?
A: Given question wants a sample code in html using bold text tag.
Q: What is the point of charts and similar data illustrations? What do they offer someone that merely…
A: - We need to talk about the supremacy of charts over spreadsheets.
Q: Ca
A: Introduction: Alan Turing detailed the concepts of algorithm and computation. Together with George…
Q: assume you have 50 to 100 employees whose ids are in the rage of 1000 to 1099, and you have a file…
A: Here is complete solution explained
Q: 7). The microcontroller has only one or two instructions to move data between memory and CPU. A.…
A: Introduction: The MOV instruction in the 8051 microcontrollers is used to move data from CPU…
Q: port if post existing on
A: I have plotted below:
Q: Examine the test data, the integrated test facility, and the parallel simulation, and compare all…
A: Under the test data technique, fictitious transactions are produced by the auditor and processed by…
Q: The state of Georgia is examining population growth for all of its counties. The governor wants a…
A: Answer:- a. while population<triplePop b. years = years + 1
Q: Why is an optical wand characterized as a hand-held device that reads markings or letters on paper…
A: answer is
Q: I want to find element in an array not date and it should be in inteliJ IDE
A: The above question is solved in step 2 :-
Q: 2. Use a paper-and-pencil approach to compute the following division in binary. i. Dividend = 1110,…
A: Given that use a paper and pencil approach to compute the following division in binary. Dividend =…
Q: actly is the purpose of Artificial Intelligence (AI)? Identify its several domains and provide two…
A: Introduction: Below describe the exactly is the purpose of Artificial Intelligence (AI) and…
Q: Describe the most important aspects of analog, digital, and hybrid computer architectures.
A: The correct answer for the above question is given in the below steps for your reference.
Q: Compare between Stack and Queue in terms of the following: 1. Insertion and Deletion Scheme 2. Main…
A: Stack and Queue are linear data structures used to store and organize data.
Q: What is needed to build a database in the physical world? Make a list of some of the most popular…
A: A database is a software that manages data in organized manner. A database is used when huge volume…
Q: 10. Create a function based on the following information: Your mission is to encrypt a secret…
A: This C++ program takes the input of the string.
Q: When it comes to cloud security, what is the "shared responsibility" paradigm like?
A: Answer: The industry has coined the term "Shared Responsibility" to describe the tasks and…
Q: List at least two benefits of OOP over PP alone.
A: There are different types of programming:- Functional Programming:- This is programming language…
Q: What is the difference between the Boolean & operator and the && operator?
A:
Q: What is the output for the following pseudocode segment? List all output. S = 1 t = 4 u = 6 while s…
A:
Q: Write a Python program to display the hex values in string format of all elements of the list given…
A: Program Explanation :- 1) Make the array list inline with variable num. 2) Then make the hex_arry…
22.2
Step by step
Solved in 2 steps
- user whose ID is beilish is working in a typical Linux system. She issues the command "pwd"and the response is "/home/beilish/alpha/config". She now wants to work in the directory /home/beilish/beta/test. Show three (3) different commands,any of which the user could issue to move from the first directory to the second,and for each command briefly explain how it works. Note: Each command must be independent, not relying on any prior command.A company has implemented a discretionary access control system for important documents and programs on a shared Linux server. Figure 1 shows the current implementation of the DAC system. It only applies to the directory /opt/company (you can ignore all files/directories that are not within this directory). The list of users is shown in the output from the firstls command; the members of each group is shown in the output of the tail command; the permissions are shown in the output of the second ls command. Assume the files are the objects, the subjects are the five users and there are four access rights: own, read, write and execute. Refer to Figure 4.2 and Table 2 in the textbook and complete the following subquestions I. Draw the Access Control Lists that illustrate the implementation on the Linux server; II. Draw the Capability Lists that illustrate the implementation on the Linux server; III. Build the Authorization Table that illustrate the implementation on the Linux server.In termina, install the paho-mqtt module with pip using the following command: Sudo pip3 install paho-mqtt Create a new folder by the name of lab_6 and create a new python file mqtt_script_1.py In the file, TYPE the following code: import paho.mqtt.client as mqtt # The callback for when the client receives a CONNACK response from the server. def on_connect(client, userdata, flags, rc): print("Connected with result code "+str(rc)) # Subscribing in on_connect() means that if we lose the connection and # reconnect then subscriptions will be renewed. client.subscribe("etec224_mqtt_test/") # The callback for when a PUBLISH message is received from the server. def on_message(client, userdata, msg): print(msg.topic+" "+str(msg.payload)) client = mqtt.Client() client.on_connect = on_connect client.on_message = on_message client.connect("broker.emqx.io", 1883, 60) client.loop_forever() Create another file py and add the following code to it.…
- On the cmsy255 server, write a bash shell script called usrinfo that displays information about a specified user. Make sure the script file is executable. Also make sure that you can run the script without having to specify the directory. For example, you should NOT have to enter ./usrinfo in order for it to run. The script should: ● ● ● Accept 1 argument from the command line (this is the User ID that you want to display info for) finger the User ID display any lines from the who command that match this User ID display any lines from the ps -ef command that match this User ID In addition, if the number of arguments is not exactly 1, display an appropriate error message and exit with an exit code of 1.Question 2 Listen MC11: What is the following Snort command for? snort -i 3 -c c:\snort\etc\snort.conf -T Test if snort works in terms of detecting attacks Check if snort has a configuration file Capture packets from network interface 3 Validate Snort configurationWinona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file. Which of the following prevented the AppLocker rules from being evaluated? a. A Path rule does not allow software to run from C:\Program Files\. b. The Windows Installer rules are not configured. c. The Executable rules are enforced and not audited. d. The Application Identity service is configured for Manual startup.
- In Mac OS X, what file can an attacker replace with a no-password-requirement version to allow all scripted actions to be performed as root? Select one: a. /Library/InputManagers b. /etc/sudoers c. /groups/wheel d. /tmp/uidthis is a TCP python socket server. this code have been used by so many people and someone asked me to make it unique, so what can i change to make it unique without breaking the code ? first file is server.py, and second one is client.py. import socket import sys import os from util import send_file, recv_file, send_listing, recv_listing script_dir = os.path.dirname(__file__) rel_path = "server/" abs_file_path = os.path.join(script_dir, rel_path) srv_sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: srv_sock.bind(("0.0.0.0", int(sys.argv[1]))) srv_sock.listen(5) except Exception as e: print(e) exit(1) while True: try: print("Waiting for new client... ") cli_sock, cli_addr = srv_sock.accept() cli_addr_str = str(cli_addr) print("Client " + cli_addr_str + " connected. Now chatting...") commandList = cli_sock.recv(1024) command = commandList.decode().split(" ", 1) if (command[0] == "list"):…Whilst practicing with Windows Powershell: 1. On a machine called server there are leftover rules that are long disabled. One of these rules is allowing connections over port 23, where a Telnet client would run. Remove the firewall rule allowing Telnet connections on the server machine. (I am trying to locate the rule with Get-NetFirewallRule | Where-Object -Displayname -like *"Telnet*") But am having trouble finding the rule to remove.
- In snort, what does the "-W" switch do? Group of answer choices "Watches" the network, .ie. goes into sniffer mode Dumps all system interfaces by Index Number Dumps all packets into a log file Dumps all rules to the consoleConsider the following interaction with shell $ myapp -bash: myapp: command not found Further, the value of the PATH variable is the following /usr/bin:/sysapps/bin: Which of the following is True? Choose the MOST correct ONE answer: Is /usr/bin will not show the executable file myapp. The executable file myapp is not present anywhere in the Unix file system. Both Is /usr/bin and Is /sysapps/bin will not show the executable file myapp Is /sysapps/bin will not show the executable file myapp.For this lab, you will write a shell script called nethelper.sh that: 1. Reads in a list of hosts from a host file that is passed in as a parameter 2. Repeatedly, until the user selects quit (q), ask the user if the user wants to ping a host or look up a hosts DNS name 3. Once the user has selected an action, prompts the user for which host and then applies the action. Note that for the ssh action, the script must also ask the user for the user name that will be used to log into the host. Step 1 To accomplish step 1 above (reading in a list of hosts from a file), you will write a function called read_hosts. Functions in bash scripts have the following syntax: function name { # function body goes here } You can put any bash syntax inside the function as the function body. Also, note that the parameters to a function act like the parameters passed in at the command line. In other words, the parameters to the function are place in variable named $1, $2, and so on. So, how do you read the…