Answer:
Question is incomplete. it needs a topology diagram and also it needs Router R1 table. I assume User has access to the topology and Routing table.
Below Configuration will help to fix ACL problem
Hosts from the 172.16.0.0/16 network should have full access to Server1, Server2 and Server3 but this is not currently the case, as L1 can’t communicate to Server2 or Server3.
Explanation:
Following Configuration on Cisco Router R1 will help to fix all the ACL problems.
enable
configure terminal
no ip access-list standard FROM_10
ip access-list standard FROM_10
deny host 10.0.0.2
permit any
exit
!
no ip access-list standard FROM_172
ip access-list standard FROM_172
permit host 172.16.0.2
exit
!
interface GigabitEthernet0/0
ip access-group FROM_192 out
end
write memory
!
The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.
Explanation:
The Start of Authority Records (SOA) has the following information they are
Serial Number: This number is used to find when zonal information should be replicated.
Responsible person: The Email address of a person is responsible for managing the zone.
Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.
Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.
Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.
Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.
Answer:
c) false positive
Explanation:
An event signaling to produce an alarm when no attack has taken place. False positives are mislabeled security alerts, indicating there is a threat when in actuality, there isn’t. By default, most security teams are conditioned to ignore false positives, In the event of a false positive an IPS will actively stop the normal activity which is likely to negatively impact business functions.
Answer:
it depends
Explanation:
if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.
if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.
ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.
Any u just get the pointer and hilight it then u paste