Question
answer all the questions
if you can not, at leaset answer the assigned ones
Windoes Firewa has been andard snce Wndrwa XP In Wndows 3P SP2, was anatied by defadt firewll is designed to protect a compue
3) Rus netstat-a fom the commnd prompe on your compater. Consider the olwing oput How is the etput you soe the wne or dif A
Windoes Firewa has been andard snce Wndrwa XP In Wndows 3P SP2, was anatied by defadt firewll is designed to protect a compuer or netwark by aontroing inbound and oubound tamc Most fiwats operae wih an implit deny phiosophy. In other wonds, al raic is ocked (mpicit deny) untess there is a nde that explicity alows the traic Windws Firewal on Winarws 7 aso uses an inplcit deny phsophy. The only traffic that is alicwed is the foilowing Taftic that is explicity alowed by an eception or a ue Both iebound and outound nies can be cenfgured Retum trafic that has been requested For esampe, fa uer nequests a web page from a websile the web page is alowed as return aaffic Windows Frewal works as boh a packat nitoring frowall and a stefu Swal PackeString Sewal Apacket ing frewat can Sitar c bmed on P adiress pots and some protcs The fiwall eamines packets indviduly Packats can be aloued or blocked bassd only on what is in each packet A packethering frewal cant evaluale packets based on he entre communikcation Se wal A sa fiwal can monitor the state of a conection in other werds, insead of axamining aach packat individualy, t evaluatos the packats in the convaration This alous a statet iwal to deect and block many atacks As a statetul firewal t can inepect and iter all IPd and IP6 tafic )Use your web beowser te investigate the technical differeace between a virs, a woem and a Trojan horse. a Faom your investigation, give a short working definition of cach of the tems i.Computer vinus ii. Computer worm i Trjan horse b. How ane computer vinuses like biological viruses? c Vrucs exploit flaus in services by targeting ports in order to spread What measures should be takn in ceder to limit these explots? How would this be accomplished? 2) art Wireshark Connect to myututoledo edu look for 3-way sonnection and disconnect Handshakes aWhatis the IP Address of the "myututoledo.edu" Server? bwhat are the Source and Destinarion pots in the "SYN ACK" packet?
3) Rus "netstat-a" fom the commnd prompe on your compater. Consider the olwing oput How is the etput you soe the wne or dif Active Connectieas Prote locsl adtees a.a. ig ddr .0.8.0 Sate TO 0. B. .04.0 . 0 4,04.0 STEN tor 13.0.4.1st TOP 127.0.3.1ls20 274.0. HED a2.0.4.u or 232-1a.3 .b.4.a 4.0-8-018) TOF 82-1 233 12ss.. TOP 332-1 .03132 .61.01 TA ETNING UITNNG or 6-4.0.i44 -4.0.aUBE yer 127.0. O 127.0.l.ia10 180-16..0 vo 1a.3 Notice that each line has the following celumns Pros, Lecal Address, Foreign Address and Sute Ler's eumine each one The name of the finst colm, Proto, sands fe potocel md is eiher TCP or UDP TCP and UDP are two typos of network protocols in the Intemet Noice tat the TCP s all ed wth cither ESTABLISHED or LISTENING S a sa ESTABLISHEDconnections are those tat are actively being usod to trasfer data The LISTENING consections are not cunestly being ased to sfer daa but they nepresent server soware that is neady to accapt and ropand to requests shold they anive The frign and local address partions of cach line are composed of two potions sparated by a cekn-an IP aldes md a port umb. The IP akdros indicaes the merical address of the computer en which the network software is nunning The port mamber indicnes the mbo" anber on that patioular computer foe that particulr service or network coveraticn bYou can ivesigate cach type of sorvice runsing on your machine For exumple, comider the fet ine TCP0300135 6.0n.a0 LISTENING tsays that a service is stming on TC port 135, What type of service typically ns on TCP pert 135 What are sone compater vinuses that have esploted flaws in this service Do a complete imvestigation of each service naning on your computer. Whut services ae nnning on your computer? What is the escstable fle involved in creating the coencction o litesing po d Agoup aled the latemet Assignod Nunsbers Authority docides what servicos nun on what pers What is the sem used to descrbe the ponts assigned by the lternet Assignod Nusbers Athority
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution

a)

i)Computer Viruses

A computer virus is a program that attaches itself to a program or file so it can spread

from one computer to another computer

ii)Computer worms

Computer worm is one type of virus

The major difference between worm and virus is it will spread from one computer to another computer without human help

Computer Worms used to slow the network by consuming too much memory

iii)Trojan horses

Trojan horse looks like a genuine software but it will do damage if you install and run on your computer

Trojan Horse creates backdoor for all the malware in your system

--

B)

Computer Virus more or less it is similar like biological virus, Biological virus will spread by inserting itself into living cells.

In both computer virus and biological virus insertion of virus is called infection

Antibiotic is required to cure biological virus
Antivirus is required to remove computer virus

--

the c part in the question 1

and question 3 picture is not clear

please repost the question with good quality picture

love to answer

all the best

Add a comment
Know the answer?
Add Answer to:
answer all the questions if you can not, at leaset answer the assigned ones Windoes Firewa...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 1 1 The time to live field of IP header can prevent -------- in packet...

    Question 1 1 The time to live field of IP header can prevent -------- in packet forwarding Question 2 In TCP connections, RST packets are used to ---------   Question 3 (Multiple answers if applied) The protocol field of the IP header can be   A) IP B) TCP C) ICMP D) UDP E) ARP Question 4 Frame exists in ------, packet exists in ------ , data segment existis in------ of TCP/IP model. Question 5 A web browser is -------- --------------- Question...

  • 1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure...

    1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...

  • Can anyone answer and explain the following questions from Into to Computer Networking course? 1) PTSN...

    Can anyone answer and explain the following questions from Into to Computer Networking course? 1) PTSN networks are: a) Packet-switching networks offering connection-oriented services b) Packet-switching networks offering connectionless services c) Circuit-switching networks offering connection-oriented services d) Circuit-switching networks offering connectionless serive 2) Connection setup and temination, if performed, takes places in this layer of the internet model a) Presentation layer b) Session layer c) Network layer d) Physical layer 3) UDP sockets are identified by: a) Client program port...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1)...

    TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) The grouping of two or more class networks together is called a CIDR block. True or False?             1) _______ 2) The User Data Protocol (UDP) is used to speed up data transfers. True or False?   2) _______ 3) Two host bits are borrowed if four subnets are to be created. True or False?             3) _______ 4) A host computer is assigned the IP address...

  • 1. How many hosts can reside on a single Class C network? 1. 65535 2. 256...

    1. How many hosts can reside on a single Class C network? 1. 65535 2. 256 3. 254 4. 127 2.   Select the invalid IP address 1. 95.31.0.15 2. 143.256.11.2 3. 24.123.33.60 4. 135.10.243.1 3. What layer in the TCP/IP protocol suite would a Web Browser reside? 1. Data Link 2. Application 3. Network 4. Physical 4. If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it...

    Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it reduces the amount of work needed in physical delivery. Do not use any example in the book, the postal service, or the telephone network.1.2 A firm is assigned the network part 128.171. It selects a 10-bit subnet part. a) Draw the bits for the four octets of the IP address of the first host on the first subnet. (Hint: as we don’t use all...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT