Which of the following commands will configure a firewall to block all outbound telnet traffic from a Linux computer? ufw deny out telnet ufw allow all except telnet ufw block telnet out ufw disallow telnet
Q: While troubleshooting a workstation connectivity problem, you enter the following command: ping…
A: In the given problem, we will discuss about workstation connectivity problem.
Q: QUESTION: Analyze the following script. What type of scan is the script used to run on a target…
A: Introduction:This is a python script which is scanning all the ports in a given host using multi…
Q: Which of the following Linux commands can you use to configure a network interface name "eth03" with…
A: Answer is Sudo ipconfig 192.168.1.2/24
Q: Question 10 The below commands perform the same action of temporarily assigning an IP address and a…
A: /etc/hosts It is used to map the hostname with IP address. Once they are mapped, hostname can be…
Q: Which of the following is an advantage of dynamically configuring IP addresses to the clients? a.…
A: We are asked a question on advantage of dynamically configured IP assigned to clients.
Q: A user reported that he has trouble connecting his PC to the server. Which of the below commands is…
A: Ping is the most suitable command to perform trouble connecting issues. Ping is the answer
Q: Which of the following Linux Intrusion Detection Systems can be used to detect alteredfiles and…
A: AIDE and tripwire are the Linux intrusion Detection Systems which can be used for detecting altered…
Q: * What does a VLAN do? O Acts as the fastest port to all servers. O Provides multiple collision…
A: Question 1: The answer is Option D. VLANs break up broadcast domains at layer 2.
Q: Which command within the command-line FTP utility can be used to change the currentdirectory on the…
A: Command used for changing the current directory lcd command is used within FTP utility. lcd command…
Q: Which two commands can be used to modify the route table on a Linux computer?(Choose two answers.)a.…
A: Explanation: Route table is used to identify the routing packet status. It contains the list of…
Q: Perform the following tasks: a) Write the command to install ssh on…
A: Given: Perform the following tasks: a) Write the command to install…
Q: In linux, what is the iptables command that Deny all inbound and outbound traffic?
A: Iptables is just a command-line interface for the Netfilter packet philter feature.Iptables' packet…
Q: 8. Which command is used to enable/disable remote management in the windows server 2016? O a.…
A: Ipconfig is related to network configuration of ip. Ipconfig all list all current TCP/IP network…
Q: what command, common across the vast majority of operating systems, can be used to view network…
A: netstat command is used to display network connections for Transmission Control Protocol, routing…
Q: Hi, i would like to know how can i modify the firewall to let the DNS traffic in from any source in…
A: The firewall service can be changed using firewall control panel or using the API (Application…
Q: Which of the following is an example of a security threat to a web server? O a. Managed open ports O…
A: an example of a security thread to a web server
Q: Which device can manage traffic to multiple servers in a cluster, so all servers equally share the…
A: Answer: Load balancer Explain: Network Load Balancing (NLB) straightforwardly disperses traffic…
Q: Which one of the following statement is true about IEEE 802.1X a port-based access control and…
A: IEEE 802.1x is a standard for the port based Network Access Control. It provides an authentication…
Q: What would the command route del default gw 192.168.5.1 eth1 accomplish on your Linux workstation?…
A: The command route del default gw 192.168.5.1 eth1 do Remove the workstation's route to the default…
Q: When you use public WiFi hotspot, such as in the airport, you may be vulnerable to Evil Twin attack.…
A: In a normal Public Wi-Fi connection, When an evil twin AP is present, a threat actor broadcasts the…
Q: Which command on an Arista switch would require an SNMP notification when too many devices try to…
A: Switch port security: Anyone can access any unsecure network by just plugging the user host into…
Q: Assign a dynamic IP address to a client on interface eth0 Find out the path of the packet to the…
A: 1. Assign a dynamic IP address to a client on interface eth0: 2. Find out the path of the packet to…
Q: New DNS servers have been added to the server configuration of your DHCP server. What is the most…
A: Foundation: The appliance will broadcast any changes to the DNS server's A records immediately, but…
Q: u have been tasked with ensuring that the switches used in your organization are secured and there…
A: Lets see the solution.
Q: TRUE about DMZ (demilitarized zone) in a network system?
A: TRUE about DMZ (demilitarized zone) in a network system
Q: Which statement is true about Staged Payload? O Instructs the target machine to open a shell command…
A: It is a payload of type staged type windows/shell/reverse_tcp. In the whole process string sent to…
Q: Which of the following firewalld commands can be used to allow incoming SSH connectionsthe next time…
A: The "firewall-cmd --add-service ssh --permanent" firewall command can be utilized to enable incoming…
Q: A PC cannot connect to any remote websites ping its default gateway, or ping a printer that is…
A: A ping (Packet Internet or Inter-Network Groper) is an essential Internet program that permits a…
Q: Which among the following interfaces or modes can be protected with passwords? O a. router…
A: What Does Virtual Teletype (VTY) Mean:- Virtual teletype (VTY) is a command line interface (CLI)…
Q: Which of the below technologies is used to monitor traffic circulating through a specific port? O…
A: SPAN (Switched Port Analyzer) is a specialized switch port that sends a duplicated copy of network…
Q: nfigure network settings in Linux? Please type out in text as handwriting is difficult to read.
A: Network Manager A network manager is in control of an organization's computer systems. Maintaining…
Q: Which application embedded in Windows operating systems allows remote control of a computer and uses…
A:
Q: QUESTION 36 Which command-line sends an ICMP echo request/reply packet to a remote host? a. Nslookup…
A: Given: Which command-line sends an ICMP echo request/reply packet to a remote host. As per the…
Q: Explain how the ICMP ping messages are able to travel across different networks. (Write the answer…
A: Need to explain : How the ICMP ping messages are able to travel across different networks. Need to…
Q: A user in the IT department has an IP address listed in a report and needs to convert the address to…
A: A FQDN (Fully Qualified Domain Name) is the domain name (complete) for a particular host or a…
Q: Which component uses port mirroring to collect information from domain controllers and DNS servers?…
A: Component using port mirroring method for collecting information from domain controllersAdvanced…
Q: Which of the following refers to the network scanning techniques that indicate the active host…
A: In this problem we need to provide a best option that is used for network scanning techniques with…
Q: Linux: 1. What command can you use to create a secure connection with remote server? a. ssh b.…
A: 1. What command can you use to create a secure connection with remote server? a. ssh b. systemd c.…
Q: Question 6 ) Listen On an unconfigured Linux machine, after setting the IP address from the command.…
A: Given: On an unconfigured Linux machine after setting the ip address from the command line the…
Q: Which one of the following can be used as a hardware firewall? а. Hub O b. Switch О с. Bridge O d.…
A: A hardware firewall is a device which performs the functions of a firewall that is filtering the…
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Run the following Network Configuration Commands using Linux and provide screenshots: • ifconfig • ping • traceroute • netstat • dig • nslookup • Route • Host • ARP • IWCONFIG • HOSTNAMEWhich of the following scan attempts can penetrate a router and firewall that filter incoming packets with particular flags set and is not supported by Windows? (A) PING sweep attempt B) TCP full connect scan attempt ⒸARP scan attempt (D) TCP null scan attempt2. Configure Manual IP address on your Linux Virtual Machine by modifying the network script file for the enp0s3 interface as follows: IPv4: 192.168.x.1 Netmask: 255.255.255.0 Gateway: 192.168.x.254 DNS: 192.168.x.1 X=the last 2 digits of your student ID. If the digits are 01 then use 101 or 02 use 102 etc.
- After performing a port scan against one of the targeted systems, you have found that ports number 21 and 25 are open. Which of the following services are running on the target system? O a. FTP and HTTP O b. POP3 and SMTP O c. SSH and DNS O d. FTP and SMTPConfigure Manual IP address on your Linux Virtual Machine by modifying the network script file for the enp0s3 interface as follows: IPv4: 192.168.x.1 Netmask: 255.255.255.0 Gateway: 192.168.x.254 DNS: 192.168.x.1 X=the last 2 digits of your student ID. If the digits are 01 then use 101 or 02 use 102 etc. Capture the updated contents of the ifcfg-enp0s3 script file. Paste them in the following space: Display the history of commands in the terminal. Capture the screen and paste the outputYou are creating a VPN infrastructure in a test lab to use only L2TP for VPN server running on Windows Server 2019. Which of the following ports will you open on firewall on VPN server? Inbound Rule for Remote Shutdown (RPC) Remote Service Management (RPC-EPMAP) Remote Service Management (RPC) Routing and Remote Access (L2TP-In)
- attack that exploits the TCP three-way handshake to consume resources on the targeted server and disable the server to respond to legitimate connection requests a. UPD Flood b. SYN SPOOFING c. ICMP Flood d. Ping to deathA network administration has been configured a standard ACL that will deny any traffic from 127.17.0.0/16 network, but permit all other traffic, which of the following commands should be used to address this policy? Access-list 20 deny 127.17.0.0 255.255.255.255 Access-list 20 permit any Access-list 20 deny host 127.17.0.0 Access-list 20 permit any Access-list 20 deny 127.17.0.0 255.255.0.0 Access-list 20 permit any Access-list 20 deny 127.17.0.0 0.0.255.255 Access-list 20 permit anyGodwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. A.You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? 1.SSH 2.Telnet 3.RDP 4.POP3
- In linux, what is the iptables command that allows inbound UDP packets to the server ports 10001 to 10007 from the client node.An attacker tries to do banner grabbing on a remote web server and executes the following command:$ nmap -sV hackme.com -p 80 He gets the following output:Starting Nmap 7.90 ( http://nmap.org ) at 2020-09-26 22:47 ESTNmap scan report for hackme.com (108.58.137.114)Host is up (0.048s latency).PORT STATE SERVICE VERSION80/tcp open http Apache httpdService detection performed. Please report any incorrect results at http://nmap.org/submit/.Nmap done: 1 IP address (1 host up) scanned in 7.36 seconds What did the hacker accomplish? nmap can’t retrieve the version number of any running remote service. The hacker successfully completed the banner grabbing. The hacker should have used nmap -O host.domain.com. The hacker failed to do banner grabbing as he didn’t get the version of the Apache web server.Allow TCP IPv4 192.168.1.21 to firewalld linux command only pls