Answer:
Static web pages are sent as it is at web server without being processed additionally.
Dynamic web pages content may change, and server hosting dynamic web pages return content after processing trough a program.
Examples of dynamic and static web pages are below
Explanation:
<em><u>dynamic websites</u></em>
f o o t y r o o m (.co) It is a football website. Displays latest highlights and football stats. It is dynamic because it gives live match scores, as the scores change, content change as well.
a c c u w e a t h e r (.com) It shows weather information. It is dynamic because when requested, displays current weather information.
x e (.com) It is a currency website. Dynamic because it shows live exchange rates.
<em><u>static websites</u></em>
s c i p y - l e c t u r e s (.org) It is a website about scientific python environment. It is static because it gives same content whenever requested.
d o g a c a n d u . b l o g s p o t (.com) it is a blog. Static because the requested content doesn't change unless the blogger adds a new story.
z t a b l e (.net) It is a website about z-score values and includes z-tables. It is static because its displayed as it is.
Answer:
The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:
1. Arachni
2. Grabber
3. Iron wasp
4. Nogotofail
5. SonarQube
6. SQLMap
7. W3af
8. Wapiti
9. Wfuzz
10. ZedAttack Proxy Zap
Explanation:
The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.
The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.
b check your blind spots frequently i guess not sure
Answer:
It is not possible.
Explanation:
In this example, we need to accommodate 473 computers for six clients that are 473 IP addresses.
For this request just we have /22 IPv4 address blocks, this mean
22 red bits 11111111111111111111110000000000 <--- 10 host bits
We must increase red bits to 25, we need these 3 bits to create 6 sub red, in this case, 2^3 = 8 sub red.
Why did we ask 3 bits? Because if we ask only 2, 2^2 = 4, and we need 6 sub red.
25 red bits 11111111111111111111111110000000 7 host bits
In this case, we need more than 260 computers, but just we have 7 bits, this means.
2^7 = 128 and just one customer needs 260, for that is impossible.