subject
Computers and Technology, 11.12.2019 01:31 h2o12

Miller harrison was still working his way through his attack protocol.
nmap started out as it usually did, by giving the program identification and version num-ber. then it started reporting back on the first host in the sls network. it reported all ofthe open ports on this server. the program moved on to a second host and began report-ing back the open ports on that system, too. once it reached the third host, however, itsuddenly stopped.
miller restarted nmap, using the last host ip as the starting point for the next scan. noresponse. he opened another command window and tried to ping the first host he had justport-scanned. no luck. he tried to ping the sls firewall. nothing. he happened to know theip address for the sls edge router. he pinged that and got the same result. he had beenblackholed, meaning his ip address had been put on a list of addresses from which the slsedge router would no longer accept packets. ironically, the list was his own doing. the idpshe had been sls configure seemed to be working just fine at the moment. his attemptto hack the sls network was shut down cold.
questions: 1-do you think miller is out of options as he pursues his vendetta? why or why not? 2- if you think there are additional actions he could take in his effort to damage the sls network, what are they? why? 3-suppose a system administrator at sls happened to read the details of this case. what steps should he or she take to improve the company's information security program? why?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 08:00
Match the items with their respective descriptions.
Answers: 1
question
Computers and Technology, 23.06.2019 14:30
The basic work area of the computer is it screen that you when you first fire up your computer
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
1. which of the following statements are true about routers and routing on the internet. choose two answers. a. protocols ensure that a single path between two computers is established before sending packets over it. b. routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. c. a packet traveling between two computers on the internet may be rerouted many times along the way or even lost or "dropped". d. routers act independently and route packets as they see fit.
Answers: 2
question
Computers and Technology, 23.06.2019 16:00
What is the biggest difference between section breaks and regular page breaks? section breaks are more difficult to add than page breaks. section breaks make it easier for you to view the document as an outline. section breaks allow you to have areas of the document with different formatting. section breaks are smaller than regular page breaks.
Answers: 2
You know the right answer?
Miller harrison was still working his way through his attack protocol.
nmap started out as it...
Questions
question
Social Studies, 04.07.2019 00:30
question
Mathematics, 04.07.2019 00:30
Questions on the website: 13722360