Reference no: EM13770600
Questions:
1. Is the activity occurring in packets 1-6 abnormal, in and of itself (that is, before you look at everything else in the packet)? If so, provide an interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
2. Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
3. Is the activity occurring in packets 31-405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible consequences. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
4. Is the activity occurring in packets 528-530 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
5. Is the activity occurring in packets 904-973 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
6. Is the activity occurring in packets 991-1293 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
7. Is the activity occurring in packets 1309-1405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
8. Is the activity occurring in packets 1406 to the end of the packet capture abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.
Find the price at which the firm makes zero profits
: Suppose that the cost function of a firm is C(q) = 10 + 3q + 0.1q 2 and that it operates under perfect competition. If p = 4, find the optimal quantity, the costs, the revenue and the profits. Find the price at which the firm makes zero profits, that..
|
Difference between a simple interest note and a simple disco
: You decide to take out an ordinary interest loan of $30,000 at 4%, on a 90 day note. a.) In 45 days you decide to make a payment of $10,000 on the loan. What is your new principal? Explain how you got the answer. b.)How much did you pay at the end of..
|
What is the minimum bid per widget
: A firm is considering bidding on a project to produce eight widgets per year for the next four years. In order to complete the project, the firm must lease facilities for $30,000 per year, purchase equipment that costs $100,000, as well as pay labour..
|
Yield-to-maturity of a bond with a finite maturity
: The yield-to-maturity of a bond with a finite maturity date is a function of all of the following variables except:
|
What is occurring and the possible uses of the information
: Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I ..
|
Create matrix of vulnerability attributes and system object
: Create a Matrix of Vulnerability Attributes and System Object. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities.
|
How to assign the cost of direct labor to each job
: What services does the firm oiler, what document or procedure do you use to collect the costs of services per formed for each customer and how to assign the cost of direct labor to each job?
|
What is the minimum-cost output
: What is the minimum-cost output? What is this manufacturer's fixed cost, For each level of output, calculate the variable cost (VC). For each level of output except zero output, calculate the average variable cost (AVC), average total cost (ATC), a..
|
What is meant by a protective put
: What is meant by a protective put? What position in call options is equivalent to a protective put?
|