[SOLVED] 编程代写 Cyber Security Tutorial 2

30 $

File Name: 编程代写_Cyber_Security_Tutorial_2.zip
File Size: 357.96 KB

SKU: 1526401447 Category: Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Or Upload Your Assignment Here:


Cyber Security Tutorial 2
Instructions
In this tutorial you should work preferably in pairs or alone. Try to answer all the questions together and discuss the possible answers/solutions. You will be given 30 minutes to complete this task and, in the end, a general discussion will take place in class based on the content of this tutorial. Try to answer as many questions as youcan!
Question 1

Copyright By PowCoder代写加微信 assignmentchef

You are given a variety of port numbers. Please fill in the table with the protocols normally associated with these port numbers and briefly explain what every protocol is used for.
Port Protocol Number
Question 2
Description
Discuss between your team why it is important to know which protocol is associated with a port number. Is there any good reason considering the cyber security aspect?
Question 3
Identify different types of DNS records and explain their meaning. Try to identify through your research at least five of them.
Question 4
How many versions of IP addresses exist and what are their differences?

Question 5
Below you will be given two columns that you will be asked to match accordingly. One column refers to different type of addresses in networking and the other gives examples. You are being asked to make the correct connection.
MAC address DNS
IPv4 address IPv6 address Domain address
Question 6
What is the range of local IPv4 addresses?
Question 7
2001:db8:85a3:0:0:8a2e:370:7334
192.168.43.58
www.bbc.co.uk AAAA
00:0a:95:9d:68:16
DISCLAIMER: UNDER NO CIRCUMSTANCE YOU MUST USE WIRESHARK OTHER THAN WHAT INSTRUCTED BY YOUR LECTURER. YOU WILL ONLY OPEN THE SAMPLE WHICH WAS PROVIDED THROUGH MOODLE FOR EXAMINATION. YOUR LECTURER WILL NOT BE RESPONSIBLE FOR ANY OTHER USE.
You will be given a networking sample that you can open with Wireshark. All necessary files have been uploaded to Moodle. Investigate the sample and try to identify important information:
1) What is the communication about?
2) Which protocols can you identify and what is their use?
3) What is the source IP address, port and the destination IP, port?
4) Anything else that is notable in the sample?

程序代写 CS代考加微信: assignmentchef QQ: 1823890830 Email: [email protected]

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] 编程代写 Cyber Security Tutorial 2
30 $