Chapter 7 Infor Sec

In: Computers and Technology

Submitted By ronbon
Words 788
Pages 4
HOME WORK
7

3. Name two different types of encryption supported by GPG for your key.
4. What happens when you sign and trust a new key to your keychain?
5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you import and sign his/her key?

6.What are the similarities between an MD5 hash and a fingerprint?

7. How would you encrypt a Web server and the pages it serves up?

8. Why is hashing all database inputs not considered encryption of the database? What value does hashing database entries provide?

9. Where would you remove a user’s certifi cate from being able to access systems on your network?

10. Which connection type is secure and which is cleartext between SSH, Telnet, and FTP?

1

2-What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router?

3-Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source?

4-If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary?

5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of
172.30.0.0/24?

6. Name at least fi ve different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.

7. How many different tests (i.e., scripts) did your “Intense Scan” defi nition perform? List them all after reviewing the scan report.

8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report.

9. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI (Nmap) fi nd…...

Similar Documents

Chapter 7

...Chapter 7-9 Homework Key, CH341 |1. |Give the major organic product of the reaction of 1-ethylcyclopentene with each of the following reagents. Show |[pic] | | |stereochemistry when appropriate. | | |a. D2 with a Pt catalyst. D’s add |b. H-Br |c. H2O with H2SO4 as a catalyst. |d. Cl2: the Cl’s add trans to the | |cis | | |C=C. | |[pic] |[pic] |[pic] |[pic] | 2a. Draw an arrow-pushing mechanism for the following reaction. [pic] [pic] The methanol attacks from the back side of the cyclic bromonium ion, since the Br is blocking the front side from attack. b. This is two additions of H-Cl to a pi-bond, one after the other. [pic] [pic] [pic] 4. Give IUPAC names for the following structures |a. |[pic] |b. |[pic] | | | | |4-butyl-5-propylcycloheptene | | |7-propylundec-2-yne ...

Words: 293 - Pages: 2

Apple Sec 10k Filling Analysis Chapter 1

...Print out your completed electronic template.   3. Attach the following: * This front cover (completed) * Electronic solution template * Company annual report Chapter 1 - Introduction * Chapter 1: Select a Company and Gather Documents—Question 1Fill in the page numbers on the annual report where the following are located. | Required information for this workbook project. | Page No. | Required information for this workbook project. | Page No. | Financial Highlights (Not absolutely necessary, but very common in annual reports.) | 36 | Statement of Cash Flows | 59 | Chairman’s Message (President’s, CEO’s or other top official’s message or letter to the shareholders) | 36 | Notes to Financial Statements | 60 | Management’s Discussion and Analysis (MD&A) | 36 | Report of Independent Accountants or Independent Auditors’ Report | 89 | Income Statement(Statement of Earnings) | 36 | Five- or Ten-Year Summary of Operating Results | | Balance Sheet (Statement of Financial Position) | 56 | Management’s Report (Responsibility) on Internal Control over Financial Reporting (Item 9A. Control and Procedures in SEC 10K) | 93 | Statement of Change in Stockholder’s Equity | 58 | Investor and Company Information or Shareholder Information | 1 | Chapter 1: Identify Why You Selected This Company—Question 1 A) What is/are your motivation(s) or interest(s) in selecting this company? [See above for examples.] B) What question(s)......

Words: 1572 - Pages: 7

Bankruptcy Under Chapter 7

...Bankruptcy Under Chapter 7 Introduction Bankruptcy under chapter 7 in the United States was crafted to ensure the liquidation process is carried out in a procedural manner without subjecting unnecessary losses to other businesses. The bankruptcy code for liquidation states that, in case of businesses inability to fulfill its creditors’ obligations, the debtors assets shall be sold nonexempt and the proceeds from the sale distributed to the creditors. There are various notes, which govern the execution bankruptcy case under chapter 7. The monthly current income which is received by the debtor in reference to bankruptcy code is defined as the average monthly income which is received on average over the last six months prior to commencement of the bankruptcy case. This average income includes contributions directed towards household expenses received from non-debtors which includes debtors’ spouse when the petition if filed jointly. However, this note does not include any proceeds and income received by the debtor from social security income as well as certain payments made due to the debtor been a victim of certain crimes (United States Courts 1). In order to determine whether a presumption of any kind of abuse arises, every debt that holds a consumer debt and files a bankruptcy case under chapter 7 is statutory required to complete an official bankruptcy form B22A. This is a vital and indispensable document for use in the case known as “Statement of Current Monthly Income......

Words: 2609 - Pages: 11

Chapter 7

...CHAPTER 7 Cash and Receivables ASSIGNMENT CLASSIFICATION TABLE (BY TOPIC) | | |Brief Exercises | | |Concepts | |Topics |Questions | |Exercises |Problems |for Analysis | | 1. |Accounting for cash. |1, 2, 3, |1 |1, 2 |1 | | | | |4, 22 | | | | | | 2. |Accounting for accounts receivable, |5, 6, 7, 8, 9, 10, |2, 3, 4, 5 |3, 4, 5, 6, 7, 8, |2, 3, 4, |1, 2, 3, 4, | | |bad debts, other allowances. |11, 12, 13, 14, 15, | |9, 10, 11, 12, 14 |5, 6 |9, 10, 11 | | | |16, 20 | | | | | | 3. |Accounting for notes receivable. |14, 15 |6, 7 |18, 19 |8, 9, 10 |5, 6, 7, 8 | | 4. |Assignment and factoring of accounts|17, 18, 19 |8, 9, 10, 11, 12 |12, 13, 14, 15, 16,|7, 11 |4, 5, 7 | | |receivable. | ...

Words: 18809 - Pages: 76

Chapter 7

...Chapter 7 MerChandising Corporation assessment Questions as-1 ( 1 ) What is a merchandising business? A merchandising business can be defined as any business that buys and sells product for the ______________________________________________________________________________ purpose of making a profit. ______________________________________________________________________________ ______________________________________________________________________________ as-2 ( 1 ) What do common shares in a corporation represent? Common shares represent money invested directly in a company by its owners, who received ______________________________________________________________________________ shares of the company in return. ______________________________________________________________________________ ______________________________________________________________________________ as-3 ( 2 ) What does retained earnings in a corporation represent? Retained earnings represents all the profits that the business has retained (i.e. not paid to the ______________________________________________________________________________ owners). ______________________________________________________________________________ ______________________________________________________________________________ as-4 ( 3 ) In a perpetual inventory system, how often are inventory levels updated? A perpetual inventory system updates inventory levels after every purchase and sale.......

Words: 4549 - Pages: 19

Chapter 7

...Chapter Seven: Deviance Deviance is recognized as the violation of cultural norms. Norms help guide us thought life activity. Crime is an act of violation of society formally enacted criminal law. Criminal deviance is divided into a wide range of offenses, from minor traffic violation to sexual assault to murder. In general that we would normally view nonconformity as breaking the rules, or regulation, like driving while under the influence of alcohol, stealing which is viewed as someone is negative or an bad person. On the other side we view someone that is good as a nerd that doesn’t do anything but think about computer software and programs, and someone that does a lot of volunteer work. Deviance doesn’t have to involve our actions or even choose. Some deviances action can be detached on how we all think about others and if we don’t like a certain people because of the person’s disability race, and other difference. This means that racial hate groups are performing a deviance act against other unlike racial groups. Social control is subjected to everyone in a society. Social control is an attempt to control people’s thoughts and behavior to standards of the society. Unfortunately social control has been able to control all of those murders and other people that constantly break the rules and regulation. In cases of serious deviance, however may bring action by the criminal justice system, which is a formal response by police, courts, and prison official to......

Words: 2769 - Pages: 12

Chapter 7 Financial Management

...Chapter 7 Continuous Probability Distributions 1. a. a = 6 b = 10 b. 8, found by (6 + 10)/2 c. 1.1547 found by [pic] d. [1/(10 – 6)](10 – 6) = 1 e. 0.75, found by [1/(10 – 6)](10 – 7) f. 0.5, found by [1/(10 – 6)](9 – 7) (LO 2) 2. a. a = 2 b = 5 b. 3.5, found by (2 + 5)/2 c. 0.8660 found by [pic] d. [1/(5 – 2)](5 – 2) = 1 e. 0.8, found by [1/(5 – 2)](5 – 2.6) f. 0.2667, found by [1/(5 – 2)](3.7 – 2.9) (LO 2) 3. a. b. Mean is 65 found by (60 + 70) / 2; Variance is 8.3333 found by [(70 – 60) ^ 2] / 12 c. 0.8 found by [1 / (70 – 60)] (68 – 60) d. 0.6 found by [1 / (70 – 60)] (70 – 64) (LO 2) 4. a. Mean is 2100 found by (400 + 3800) / 2 b. 981.50 found by[pic] c. 0.4706 found by [1 / (3800 - 400)] * (2000 – 400) d. 0.2353 found by [1 / (3800 - 400)] * (3800 – 3000) (LO 2) 5. a. a = 0.5, b = 3.0 b. Mean is 1.75, found by (0.5 + 3.0)/2 Standard deviation is 0.72, found by [pic] c. 0.2, found by [1/(3.0 – 0.5](1.0 – 0.5) d. 0.0, found by [1/(3.0 – 0.5](1.0 – 1.0) e. 0.6, found by [1/(3.0 – 0.5](3.0 – 1.5) (LO 2) 6. a. a = 0.5, b = 10.0 (using minutes as the units) b. Mean is 5.25, found by (0.5 + 10)/2 Standard deviation is 2.74, found by [pic] c. 0.5263, found by [1/(10 – 0.5]*(10 – 5) d. 2.875, found from [1/(10 – 0.5]*(x – 5) = 0.25 and 7.625......

Words: 3931 - Pages: 16

Ehr Chapter 7 Review

...Chapter 7 Review, Page 300 1. A problem list is an up-to-date list of the diagnoses and conditions that affect a particular patient’s care. 2. The idea of a problem list is to ensure that everyone who touches a patient knows what conditions are present. 3. Using a problem list is easy for clinicians to view active and history of problems. Most clinical information recorded in the charts are related to one or more problems. Problem lists are used to track both acute and chronic conditions. It helps clinicians remember to follow up on conditions from previous visits. They actually are required to use a problem list. Maintaining a problem list is a requirement for accreditation by JCAHO. 4. Wellness conditions on the problem list are used to generate preventative care recommendations for healthy patients. It is based on age and sex of the patient and are used in health maintenance and preventative screening programs to keep patients healthy. 5. The data that appears in the manage tab comes from previous encounters or patient visits. 6. Finding a citing means to bring a finding to the current encounter, usually as a follow up to a previous visit. 7. Lab values means to compare the change of certain test components over a period of time. 8. To graph a patient’s weight, all you need to do is click on the graph menu at the very top of the screen to the left, and click weight. 9. Anything with numerical values can be graphed. 10. A......

Words: 368 - Pages: 2

Chapter 7

...7 - 14) Let A = Number of air conditioners to be produced F = Number of large fans to be produced. Department | Air conditioners | Fans | Total number of hours available | Wiring | 3 Hours | 2 Hours | 240 | Drilling | 2 Hours | 1 Hour | 140 | Profit per unit | $ 25 per unit | $ 15 per unit | | Maximum profit P = ($25) * (A) + ($15) * (F) Hours of wiring time used is ≤ 240 ==> 3A + 2F ≤ 240 Hours of drilling time used is ≤ 140 ==> 2A + 1F ≤ 140 Both ( A and F ≥ 0 ) Draw the graph for 3A + 2F = 240 ==> Substitute A as zero we will get point as (0, 120) Substitute F as zero we will get point as ( 80, 0) 2A + 1F = 140 ==> Substitute A as zero we will get point as (0, 140) Substitute F as zero we will get point as (70, 0) The optimal solution is air conditioners A = 40 and large fans F = 60 Maximum Profit P = ($25 * 40) + ($15 * 60) = 1000+900 = $1,900 . OR Solving for A and F from above equations 3A+2F = 240 -----------------------equation1 2A+1F = 140 -----------------------equation2 from equation2 F = 140 - 2A ---------------------equation3 substitute equation3 in equation1 for finding A 3A+2(140-2A) = 240 ==> 3A + 280 - 4A =240 ==> A = 40 Substitute value of A in equation 2 to find F 2(40) + 1F = 140 ==> F = 60 The optimal solution of A is 40 and F is 60 Maximum profit P = ($25 * 40) + ($15 * 60) = 1000+900 = $1,900 . 7 - 18) Let UG = Number of undergraduate courses to......

Words: 422 - Pages: 2

Chapter 7

...b. Repeated contact between sellers and buyers creates relationships that can strengthen customer loyalty over time. Explanation: The answer can be found in Section 7.5. * c. The only way to trigger new relationships to form is through reliance on pricing incentives. * d. Encouraging customization of products causes social bonds to form. Review this content to learn more. 6. Which of the following is NOT a stage in the buyer-seller relationship? * a. Encouraging new relationships to form * b. Making a relationship difficult to replace * c. Rewarding loyalty with incentives Explanation: The answer can be found in Section 7.5. * d. Stimulating interpersonal social bonds Review this content to learn more. 7. Which term defines the segmentation technique that is based on information collected by the U.S. Census Bureau? * a. Demographic Explanation: The answer can be found in Section 7.3. * b. Geospatial * c. Behavioral * d. Psychographic 8. Which statement BEST defines Customer Relationship Management? * a. A tool for aggregating customers' demographic, geographic, and behavioral traits into unified profiles for enhanced relationship management. * b. A management philosophy centered on customers, supported by a data warehouse and analytic processes. Explanation: The answer can be found in Section 7.4. * c. A marketing approach designed to increase marketing campaign performance through more efficient......

Words: 3141 - Pages: 13

Chapter 7

...IB HL Topic 7 Nucleic Acids Homework Assignments Topic 7.1 DNA Structure and Replication Watch these videos first: (most are very short) DNA packaging by HHMI: http://www.hhmi.org/biointeractive/dna-packaging DNA replication by Bozeman: http://www.youtube.com/watch?v=FBmO_rmXxIw Outline the structure of nucleosomes. State the function of nucleosomes. Describe how DNA structure suggests its mechanism of replication. Identify the direction in which DNA polymerases add new nucleotides to a growing DNA molecule. Identify two purposes for regions of the DNA that do not code for proteins. Name the two scientists that investigated the structure of DNA using X-ray diffraction. Name the two scientists that finally proved DNA is the genetic material and briefly describe their experiment. Explain the process of DNA replication on both the leading and lagging strand. Be sure to include the following enzymes: helicase, DNA gyrase, single strand binding protein, DNA primase, DNA poly I, and DNA poly III. Topic 7.2 Transcription and gene expression Watch these videos first: Transcription by ndsuvirtualcell: http://www.youtube.com/watch?v=WsofH466lqk mRNA processing by ndsuvirtualcell: http://www.youtube.com/watch?v=YjWuVrzvZYA mRNA splicing by ndsuvirtualcell: http://www.youtube.com/watch?v=FVuAwBGw_pQ epigenetics by Bozeman: http://www.youtube.com/watch?v=i9a-ru2ES6Y Describe the direction of the transcription process. ...

Words: 372 - Pages: 2

Accounting Chapter 7 Solutions

...------------------------------------------------- Chapter 7 Stocks, Stock Valuation, and Stock Market Equilibrium ------------------------------------------------- ANSWERS TO END-OF-CHAPTER QUESTIONS 7-1 a. A proxy is a document giving one person the authority to act for another, typically the power to vote shares of common stock. If earnings are poor and stockholders are dissatisfied, an outside group may solicit the proxies in an effort to overthrow management and take control of the business, known as a proxy fight. The preemptive right gives the current shareholders the right to purchase any new shares issued in proportion to their current holdings. The preemptive right may or may not be required by state law. When granted, the preemptive right enables current owners to maintain their proportionate share of ownership and control of the business. It also prevents the sale of shares at low prices to new stockholders which would dilute the value of the previously issued shares. Classified stock is sometimes created by a firm to meet special needs and circumstances. Generally, when special classifications of stock are used, one type is designated “Class A”, another as “Class B”, and so on. Class A might be entitled to receive dividends before dividends can be paid on Class B stock. Class B might have the exclusive right to vote. Founders’ shares are stock owned by the firm’s founders that have sole voting rights but restricted dividends for a......

Words: 5843 - Pages: 24

Sec 450 Week 7 Quiz

...SEC 450 Week 7 Quiz Click Link Below To Buy: http://hwcampus.com/shop/sec-450-week-7-quiz/ 1. Question : (TCO 6) The type of IDS signature that triggers on a multiple packet stream is called _________. Student Answer: atomic dynamic cyclical compound, or composite Instructor Explanation: Compound Signatures require a packet stream for detection Points Received: 4 of 4 Comments: 2. Question : (TCO 6) Which one of the following is NOT an action that can be performed by the IOS Firewall IDS router when a packet or packet stream matches a signature? Student Answer: Drop the packet immediately Send an alarm to the Cisco IOS router and designated Syslog server Set the packet reset flag and forward the packet through Block all future data from the source of the attack for a specified time Instructor Explanation: IDS cannot block future traffic for a specified time Points Received: 4 of 4 Comments: 3. Question : (TCO 6) An IPS sensor that receives a copy of data for analysis while the original data continues toward the destination is running in ________ mode. Student Answer: passive active promiscuous inline Instructor Explanation: promiscuous mode allows malicious traffic into the network Points Received: 4 of 4 Comments: 4. Question : (TCO 6) Most IOS commands used to configure an Intrusion Prevention System (IPS)......

Words: 376 - Pages: 2

Sec 450 Week 7 Quiz

...SEC 450 Week 7 Quiz Click Link Below To Buy: http://hwcampus.com/shop/sec-450-week-7-quiz/ 1. Question : (TCO 6) The type of IDS signature that triggers on a multiple packet stream is called _________. Student Answer: atomic dynamic cyclical compound, or composite Instructor Explanation: Compound Signatures require a packet stream for detection Points Received: 4 of 4 Comments: 2. Question : (TCO 6) Which one of the following is NOT an action that can be performed by the IOS Firewall IDS router when a packet or packet stream matches a signature? Student Answer: Drop the packet immediately Send an alarm to the Cisco IOS router and designated Syslog server Set the packet reset flag and forward the packet through Block all future data from the source of the attack for a specified time Instructor Explanation: IDS cannot block future traffic for a specified time Points Received: 4 of 4 Comments: 3. Question : (TCO 6) An IPS sensor that receives a copy of data for analysis while the original data continues toward the destination is running in ________ mode. Student Answer: passive active promiscuous inline Instructor Explanation: promiscuous mode allows malicious traffic into the network Points Received: 4 of 4 Comments: 4. Question : (TCO 6) Most IOS commands used to configure an Intrusion Prevention System (IPS)......

Words: 376 - Pages: 2

Chapter 7

...(6) VI. System Installation……………………………………………………………….……………………….(8) VII. Programming Options and Operation Instructions……………………………………………….(10) VIII. Usage and Operation Steps…………………………………………………….……………………(30) IX. Trouble Shooting……………………………………………………………………………………..….(35) |Accessories | | | |1. SK-968C Instruction Manual 1 6. Power cable 1 | |2. Warranty Card 1 7. Steel nails 2 | |3. Rubber-coated antenna 1 8. Screws (4×22) 2 | |4. Remote controls 2 9. Screws (2.5×6) 2 | |5. Telephone line with two RJ11 connectors 1 10. Fuse 1 | I. Overview SHIKE’s SK-968C burglar alarm is an intelligent device capable of transmitting alarm messages via the telephone communications network. This alarm system consists of programmable user mainframe, remote controls,......

Words: 11487 - Pages: 46

The Stone Roses – The Stone Roses (20th Anniversary Special Edition) (2009) | saison 1, épisode 2 - Foutu zombies | Aliens: Colonial Marines [v 1 0 210 751923 + 8 DLC] (2013) RePack - J v M