subject
Computers and Technology, 11.12.2019 01:31 h2o12

Miller harrison was still working his way through his attack protocol.
nmap started out as it usually did, by giving the program identification and version num-ber. then it started reporting back on the first host in the sls network. it reported all ofthe open ports on this server. the program moved on to a second host and began report-ing back the open ports on that system, too. once it reached the third host, however, itsuddenly stopped.
miller restarted nmap, using the last host ip as the starting point for the next scan. noresponse. he opened another command window and tried to ping the first host he had justport-scanned. no luck. he tried to ping the sls firewall. nothing. he happened to know theip address for the sls edge router. he pinged that and got the same result. he had beenblackholed, meaning his ip address had been put on a list of addresses from which the slsedge router would no longer accept packets. ironically, the list was his own doing. the idpshe had been sls configure seemed to be working just fine at the moment. his attemptto hack the sls network was shut down cold.
questions: 1-do you think miller is out of options as he pursues his vendetta? why or why not? 2- if you think there are additional actions he could take in his effort to damage the sls network, what are they? why? 3-suppose a system administrator at sls happened to read the details of this case. what steps should he or she take to improve the company's information security program? why?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:00
Digital information is stored using a series of ones and zeros. computers are digital machines because they can only read information as on or off –1 or 0. this method of computation is known as the system
Answers: 1
question
Computers and Technology, 23.06.2019 17:00
Companies that implement and apply an information system effectively can create
Answers: 1
question
Computers and Technology, 25.06.2019 08:00
In researching his history report about the civil war, why is ariq most likely to use secondary data than primary data? secondary data provides a starting point to find primary data. secondary data is easier and less time consuming to find. secondary data is always more reliable and credible. secondary data eliminates the need for other research.
Answers: 1
question
Computers and Technology, 25.06.2019 09:00
(environmental science semester 1) which statement best describes the limits of science? a. science cannot answer any abstract questions. b. when used properly, science can answer any questions. c. usually science can answer only mathematical questions. d. science cannot answer religious questions.
Answers: 2
You know the right answer?
Miller harrison was still working his way through his attack protocol.
nmap started out as it...
Questions
Questions on the website: 13722363