Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Lab 71 Verifying the Integrity of the Hosts File115 1S. Open your r web browser

ID: 3687289 • Letter: L

Question

Lab 71 Verifying the Integrity of the Hosts File115 1S. Open your r web browser and go to www.boguswebaddress.nct. Explain the results. 18. 19. Close all windows and log off. Certification Objectives Objectives for CompTIA Security+ Exam: . 1.2 Given a scenario, use secure network administration peinciples. 1.4 Given a scenario, implement common protocols and services. 3.2 Summarize various types of attacks 3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities. . 4.3 Given a scenario, select the appropriate solution to establish host security. Review Questions 1. What is the DNS record type for an IPv6 address? a. A d. AV6 2. What is the IPv6 loopback address? a. 0.0.0.0 b. 127.0.0.1 c. 255.255.255.25 d. #1 3. How many hexadecimal characters are needed to express 256 bits? a. 16 b. 32 c. 64 d. 128 4. Which of the following statements regarding hashes is true? When a 200 MB file that has been previously hashed has one byte changed, a second hash of the file will be nearly similar to the first hash. a. When a 200 MB file that has been previously hashed has one byte changed, a second hash will be more similar to the first if SHAI were used than if SHA256 were used. When a 200 MB file that has been previously hashed has one byte changed, a second hash of the file will be much less similar to the first hash than would be the case if the file had only been 200 KB in size. b. c. When a file of any size is modified, there is no relationship between the pre- and post-modification hashes and the number of bytes modified. d.

Explanation / Answer

1.c(AAAA)

2.b

3.c

4.d

1.c

2.a

3.b

4.True

5.a

1.a

2.clear information needed

3.a

4.d

5.d

1.True

2.c

3.c

4.d

5.c

1.d

2.a

4.a

5.b