Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

There are different types of network tools used by attackers and defenders for i

ID: 3918180 • Letter: T

Question

There are different types of network tools used by attackers and defenders for information gathering purposes. Network tools can be used to identify what services and applications are running on a host while network tools can be used to analyze packets of data in the traffic flowing into and out of a port. QUESTION 19 Which of the following are examples of attacks? Select all that apply An unofficial policy in a company that allows friends of employees to enter facilities without signing in or being formally escorted Someone sits outside a company's headquarters and jams their guest win signal. A lightning strike knocks out the power to the main processing center of a financial institution. A contractor visiting a client site attempts to brute force a login to the administrator account, but is not able to able to gain access. L QUESTION 20 If a web page is accessed with the "HTTPS" prefix, all content on that page is automatically secure and transmitted over port 443 O True O False QUESTION 21 Which of the following statements is not true about Hadoop? O Hadoop can scale from one computer to many for storage space and processing power With Hadoop's HDFS multiple copies of data are copied onto multiple computers. Hadoop can run on various Linux, Unix and Windows systems. Hadoop relies on expensive, high-availability computers.

Explanation / Answer

1. Network mapper, Network packet analyzer

19. b) Someone sits outside a company's headquarters and jams their quest wifi signal (This type of attack is called Denial of Service attacks).

d) A contractor visiting a client site attempts to brute login to the administrator account, but is not able to lgain access

Explanation: Self explanatory.

20. True

Explanation: TCP port 443 is the standard TCP port that is used for website which use SSL. When you go to a website which uses the https at the beginning you are connecting to port 443.

21. c) Hadoop can run on various Linux, Unix and Windows systems.

Explanation: For time being, hadoop cannot be installed on windows machines. Hadoop assumes Linux (or a Unix flavor OS) is being used to run Hadoop. The best way to do these things on Windows is to make Windows act more like Linux.