When testing firewall security, which type of tool stresses a system to discover if it will react improperly, fail, or reveal unknown vulnerabilities

Answers

Answer 1

Answer:

Fuzzing

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

Fuzzing also referred to as fuzz testing can be defined as a software testing technique or method which typically involves inputting invalid, random or unexpected data into a computer system or software application so as to test, discover, and assess their security strength.

Hence, when testing a firewall security, fuzzing tool stresses a system to discover if it will react improperly, fail, or reveal unknown vulnerabilities (bugs) that could be exploited by unauthorized users such as a hacker.


Related Questions

What component can you use to open windows?

Answers

Answer:

Start Windows 10 Component Services via the Run dialog box. Press Win+ R keyboard shortcuts to launch Run dialog box, type dcomcnfg or dcomcnfg.exe in the box and click OK/press Enter to open Component Services.

Explanation:

what is gradient descent in neural networks?​

Answers

Answer:

radient Descent is a process that occurs in the backpropagation phase where the goal is to continuously resample the gradient of the model's parameter in the opposite direction

Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Explain why these tips are useful.

Answers

Answer:

1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons

2. Do not share your passwords because people can hack into your things

3. Don't make guessable passwords such as Cookies, ILovePizza, Money

1. Never give out your address, phone number, school name, etc.
This can lead to so many bad things. To protect yourself and others around you, don’t share your personal information to people you don’t know or trust.

2. Don’t add people on social media that you don’t know. I know a lot of people have public accounts and I’m not saying thats bad, but I am saying that you need to be careful on who’s adding you. There are a lot of creepy people out there.

3. Never open links people send you. If someone sends you a link online, it’s best to not open it. This opens up a whole new world for creeps to mess with you. They can track you, give you a virus or viruses. Never open random links that random people send you.

They need network security skills to know how to perform tasks such as:

A. Testing software before launching.
B. maintaining databases.
C. investigating virus attacks​

Answers

B) maintaining databases

Answer:

Your answer should be C

because in they will protect the data base from virus.

What tells the hardware what to do and how to do it?

Central Processing Unit (CPU)

Software

Hardware

Hard Drive (HDD)

Answers

Answer:

Software

Explanation:

Software directs a set of instructions to computer hardware and tell them what to do and how to do it.

Scenario: A robot is sitting in a chair with its arms facing down. Write an algorithm, using pseudocode, to make the robot:
1. stand up2. walk forward until it senses a wall3. turn around4. walk back to the chair5. sit down in its original starting positionFinally, output the total number of steps taken.Commands--------In addition to our standard pseudocode commands, you must also use the following robot control commands:sitstandstep (one step forward)raise arms (parallel to floor)lower arms (pointing to floor)sense (only if arms are raised)turn (90 degrees right)Immediately after issuing a sense command, you can check whether the robot is at the wall as follows:if at wallor alternativelyif not at wallAssumptions-----------You must assume the following facts:The robot's initial sitting position is directly facing the target wall.There are no obstacles between the robot and the wall.The wall is 1 or more exact steps from the chair.The wall is sensed when it is less than 1 step from the robot's arms.The length of the robot's arms are slightly less than the length of 1 step.Your solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps takenYour solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps taken

Answers

Solution :

[tex]\text{Algorithm to}[/tex] stand [tex]$\etxt{up:}$[/tex]

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

[tex]\text{Algorithm to}[/tex] walk [tex]$\text{until it senses}$[/tex] a wall:

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

step 3: [tex]$\text{wallSensed}$[/tex]=false

step 4: [tex]$\text{numberOfSteps}$[/tex] = 0

step 5: if([tex]$\text{wallSensed}$[/tex]==true) then

[tex]\text{lower arms}[/tex]

step

else

if(sense)

[tex]$\text{wallSensed}$[/tex]=true;

else

step

[tex]$\text{numberOfSteps}$[/tex]++;

step 6: display [tex]$\text{numberOfSteps}$[/tex] to reach the wall

[tex]\text{Algorithm to}[/tex] turn around:

Step [tex]1[/tex]: if([tex]$\text{wallSensed}$[/tex]==true) then

turn

[tex]\text{raise arms}[/tex]

turn

 

[tex]\text{Algorithm to}[/tex] walk back[tex]$\text{ to the chair}$[/tex]:

Step [tex]1[/tex]: [tex]$\text{turn around}$[/tex]

Step 2: for i=[tex]1[/tex] to [tex]$\text{numberOfSteps}$[/tex] do

step

[tex]\text{Algorithm to}[/tex] sit back down:

Step [tex]1[/tex]: sit

Step 2: Lower arms

A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such as word processing or spreadsheet, to hide virus code.

Answers

Answer: macro virus

Explanation:

The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.

A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.

what are the process of boots up a computer?​

Answers

Answer:

a boat causes a computer start cutting cs and max contain built in instructions in a rom or flash memory chip that are automatically excited on started up these instructions search for the operating system load it and pass control to it

Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a program that generates random numbers until the sum of the random number's digits divides the random number without remainder. assembly language

Answers

Answer:

Explanation:

The following Python program has a function called addDigits which takes a number as a parameter and returns the sum of the digits. Then the program creates a loop that keeps creating random numbers between 222 and 1000 and divides it by the value returned from the function addDigits. If the remainder is 0 is prints out a statement and breaks the loop, ending the program. The picture below shows the output of the program.

import random

def addDigits(num):

   sum = 0

   for x in str(num):

       sum += int(x)

   return sum

sum = addDigits(random.randint(222, 1000))

while True:

   myRandomNum = random.randint(2, 99)

   if (sum % myRandomNum) == 0:

       print("No remainder between: " + str(sum) + " and " + str(myRandomNum))

       break

Which of the following describes an iteration in a computer program?

Answers

Answer:

a set of instructions that can be run multiple times throughout a program

Explanation:

A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user. Plz give answer in C++.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int qty;

   float discount = 0;

   cout<<"Quantity: ";

   cin>>qty;

   int cost = qty * 100;

[tex]i f (cost > 1000)[/tex] {        [tex]discount=cost * 0.10[/tex];        }

   cout<<"Cost: "<<cost - discount;

   return 0;

}

Explanation:

This declares the quantity as integer

   int qty;

This declares and initializes discount to 0

   float discount = 0;

This prompts the user for quantity

   cout<<"Quantity: ";

This gets input for quantity

   cin>>qty;

This calculates the cost

   int cost = qty * 100;

If cost is above 1000, a discount of 10% is calculated

[tex]i f (cost > 1000)[/tex] {        [tex]discount=cost * 0.10[/tex];        }

This prints the cost

   cout<<"Cost: "<<cost - discount;

three basic components to cloud computing are client, internet

Answers

Answer:

the basic components of cloud comuting in a simple topology

Justin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles. Develop a program that asks the user for a number of miles and converts miles to kilometers (multiplying miles by 1.609), and then asks for a number of kilometers and converts kilometers to miles (multiplying kilometers by 0.6214).

Answers

Solution :

//Program heading

Display "Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program"

//Get [tex]$\text{Miles}$[/tex]

Display "Enter the [tex]$\text{miles}$[/tex]: "

Input [tex]$\text{miles}$[/tex]

//Convert [tex]$\text{miles}$[/tex] to kilometers and display result

converted_km =[tex]$\text{miles}$[/tex] x 1.609

Display "Converted kilometers = " + converted_km

//Get Kilometers

Display "Enter the kilometers: "

Input km

 

//Convert kilometers to [tex]$\text{miles}$[/tex] and display result

converted_[tex]$\text{miles}$[/tex] = km x 0.6214

Display "Converted [tex]$\text{miles}$[/tex] = " + converted_[tex]$\text{miles}$[/tex]

//Thank the user for using this program

Display "Thank you for using this program. Good-bye!"

Stop

Sample Output:

Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program

Enter the [tex]$\text{miles}$[/tex]: 10

Converted kilometers = 16.09

Enter the kilometers: 10

Converted [tex]$\text{miles}$[/tex] = 6.214

Thank you for using this program. Good-bye!

At each step it should print out the move it makes and its performance score (e.g. S 0.2). Every 5 steps, it should print out a grid, with a "[ ]" on the square where the robot is now. Thus, with the above input, if the robot has done S U S L S, the output would be:

Answers

Answer:

The output would be S 0.2 U 0.2 S 0.2 U 0.2 L 0.2 S 0.2 [ ]

Explanation:

Given that at each step output prints for example S 0.2.

Also given after every 5 steps, it should print a grid "[ ]".

if robot has been given S U S L S, it prints output as

S 0.2 U 0.2 S 0.2 U 0.2 L 0.2 S 0.2 [ ]

The register in the CPU is not the same as the RAM.
Group of answer choices

True

False

Answers

The answer is true ..........

Amy’s new summer job at the pool will put $9 per hour. Which term describes this type of hourly income?
A. Salary
B. Take-home pay
C. Wage
D. All of the above

Answers

Answer:

d

Explanation:

write down the multiples of three from 474 to 483​

Answers

Answer:

474, 477, 480, 483

hope this helps

have a good day :)

Explanation:

Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in this artwork?

A. emphasis
B. repetition
C. balance
D. alignment
E. proximity

Answers

Answer: Alignment

Explanation:

The principle of repitition indicates that some aspect of a design are repeated. This can be in form of bullet list, lines, color etc.

Balance has to do with how the weight is distributed.

The Principle of Alignment means that the pictures on a page should be connected visually to another thing.

Principle of Proximity simoly means that the items that are related on a page should be close to each other.

Therefore, the principles of page layout that Sam is planning to use in this artwork is alignment.

Answer:

D. alignment

Explanation:

. Write the advantages and disadvantages of CLI?

Answers

If you know the commands, a CLI can be a lot faster and efficient than any other type of interface. ...A CLI requires less memory to use in comparison to other interfaces. ...A CLI doesn't require Windows and a low-resolution monitor can be used

Suppose a computer using set associative cache has 221 bytes of main memory, and a cache of 64 blocks, where each cache block contains 4 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, set, and offset fields

Answers

Answer:

Tag = 1

Index = 5

Block offset = 2

Explanation:

From the given information:

The main memory bits(MM) = 221

number of block in the cache = 64 blocks

Block size = 4B

Recall that;

MM = log (memory size)

Thus;

main memory bits = log (221)

= 8 bits

Since this is a 2-way assoicative set;

the number of set in each cache = block size/2

64/2  = 32

Now, the index bit = log( no of set in each cache)

= log(32)

= 5 bits

Also since block size = 4B;

the block offset = log(4) = 2 bits

As such, tag = main memory bits - (index bit + block offset)

tag = 8 -(5 + 2)

tag = 8 -7

tag = 1

The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. These big data may be unstructured or semi-structured and are not suitable for relational DBMS products. What are the new technologies developed to handle the big data

Answers

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.

Answers

The answer for the question is butt

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print

b. random

c. else

d. while

Answers

Question:

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed

Answer:

d. while ✓

Explanation:

The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.

[tex] \\ \\ [/tex]

Hope it helps

-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀

Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should her friend give

Answers

Answer:

"The game shouldn't need your SSN to be playable; don't enter it."

Explanation:

The game shouldn't need your SSN to be playable; don't enter it."

What is SSN?

A numerical identification code known as a Social Security number (SSN) is given to residents and citizens of the United States in order to track income and calculate benefits.

As a component of The New Deal, the SSN was established in 1936 to offer benefits for retirement and disability. The SSN was first created to track earnings and offer benefits. Today, it is also utilized for other things including tracking credit reports and identifying people for tax purposes.

In the US, people are required to provide their SSN in order to open bank accounts, apply for government benefits, get credit, make large purchases, and more.

Therefore, The game shouldn't need your SSN to be playable; don't enter it."

To learn more about SSN, refer to the link:

https://brainly.com/question/2040269?

#SPJ5

Write an algorithm to sum to values

Answers

Answer:

There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:

Let a,b be two numbers.

c=a+b;

print(c);

But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:

Let a be the variable where the input numbers are stored.

while(f==1)

{

printf(“Enter number”);

scanf(“Take number into the variable a”);

sum=sum+a;

printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);

scanf(“Take the input into the variable f”);

}

print(Sum)

Explanation:

hi there answer is given mar me as brainliest

You need to build out the networking for your small local business. You have purchased a core switch and will pull home runs to each of the devices. What type of cabling will you use to connect your network

Answers

Answer: Use an Ethernet cable

Explanation:

Since the person will need to build out the networking for a small local business and wants to pull home runs to each of the devices after buying a core switch, the type of cabling that will be used to connect the network is an Ethernet cable.

An Ethernet cable is known to be the commonest network cable that's used on a wired network. The cable is required to connect the wired devices together to local network which is then vital for file sharing and Internet access.

Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.

Answers

Answer:

The method in C++ is as follows:

double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

   double baseArea = calcBaseArea(baseLength, baseWidth);

   double volume = baseArea * pyramidHeight;

   return volume;    

}

Explanation:

This defines the calcPyramidVolume method

double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

This calls the calcBaseArea method to calculate the base area of the pyramid

   double baseArea = calcBaseArea(baseLength, baseWidth);

This calculates the volume

   double volume = baseArea * pyramidHeight;

This returns the volume

   return volume;  

}

See attachment for complete program that include all methods that is required for the program to function.

1. Which of the following is a new
generation optical storage device?
CD
DVD
Blu-ray disc
Pen drive

Answers

Answer:

CD or CD Rom

fhiykkoojnddeyui

Blank Are input instructions you give to a computer

Answers

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to solve my problem this is for 24 points

Answers

Answer:

Just restart it. It would definitely work.

Explanation:

maybe try to do the discharge process?

close your laptop and take off your battery. then press on the power button for atleast 30 seconds or more. now put the battery back on and plug your laptop's charger in. then press power button......i think it'll open by then...I'm not sure tho

Other Questions
What is the summary for The Only Black Girls In Town Automation Services Co. offers its services to companies desiring to use technology to improve their operations. After the accounts have been adjusted at December 31, the end of the fiscal year, the following balances were taken from the ledger of Automation Services: Fees Earned $614,500 Dividends 45,000 Rent Expense 140,000 Retained Earnings 3,250,000 Supplies Expense 18,200 Wages Expense 320,000 Miscellaneous Expense 8,700Journalize the closing entries. Which of the following pH numbers are acidic? (Choose 2)911753 23/147 yd 3/14 after reducing them by a factor of 2/147 what are the original dimensions of the playground in yards? Write your answer with mixed numbers what are the benefits of art does art hurt the society anyway I have added 15 L of air to a balloon at sea level (1.0 atm). If I take the balloon with meto Denver, where the air pressure is 0.85 atm, what will the new volume of the balloonbe? The average number of employees that call in sick for the day over the course of a year is 25. The number of employees that call in sick on 12 days are 25, 10, 16, 39, 27, 25, 32, 25, 25, 22, 28, and 14. Enter the sample mean and the population mean in the boxes Mr. Samid and Ms. Johnson co-teach a U.S. History class. Based on the results from the most recent benchmark assessment, Mr. Samid is re-teaching a group of students who did poorly on the assessment. Ms. Johnson is extending the learning of the group of students who had mastered the previously taught concepts. This is an example of _______________ What did ancient astronomers not know about eclipses? How are organelles and cells related? sr nie wiem o co chodzi ale musz to zrobi do 18 pani od korkw mi tak przysaa lol. DAJE NAJ !!! please help no trolls no links plsHow does changing the mass of a wheelchair affect its velocity? What is the length of the hypotenuse?A. 10B. 14C. 48D. 100 You borrow $225 for eight years of an interest rate of 6%. How much interest will you pay after eight years? Which polar coordinates represent the same point as the rectangular coordinates (-4,5)? 7th grade math please help A regression was run to determine if there is a relationship between hours of tv watched per day (x) and the number of situps a person can do (y).The results of the regression were:y=ax+ba=1.077b=30.98r2=0.744769r=0.863Use this to predict the number of situps a person who watches 13.5 hours of TV can do. Which of these is a procedure that quantifies the personal value of apurchase? Find the value of x. Ik its another one of theseFind the measure of angle x in the figure below: