[solved] – Question 91791
Discuss why or why not.
If users A and B using HTTPS sessions to communicate with each other. Now, let we consider a case:one attacker who hasn’t shared keys, a bogusTCP segment was inserted in a packet stream with {correct IP addresses,sequence numbers,TCP checksum,correct port numbers }. Does HTTPS on receiving end recognize and accept fake packets, and then pass the payload to receiving application?
Expert Answer
[solved] – Question 91792
please give a strictest possible filter table and a strictest possible connection table to stateful firewalls, but complete 1,2,3,4 tasks:
1. Allows all internal users to establish SSH sessions with external hosts
3. Allows all DNS traffic
2. Allows the external users to surf the company web site at 222.22.0.12
4. But otherwise blocks all inbound and outbound traffic
Internal network is 222.22.0.0/16.
In solution, assume the connection table is currently caching 3 connections, all from inside to outside. You need to create the appropriate IP address and port number.
Expert Answer
[solved] – Question 91798
Assume user-1 and user-2 are communicating over an HTTPS session. Assume an attacker who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with correct TCP checksum and correct sequence numbers and correct IP addresses and correct port numbers. Will HTTPS at the receiving side accept the bogus packet and pass the payload to the receiving application? Discuss why or why not.
Expert Answer
[solved] – Question 91799
Provide a filter table and a connection table for a stateful firewall that is as restrictive as possible but accomplishes the following:
a. Allows all internal users to establish SSH sessions with external hosts
b. Allows the external users to surf the company web site at 222.22.0.12
c. Allows all DNS traffic
d. But otherwise blocks all inbound and outbound traffic
The internal network is 222.22.0.0/16. In your solution, assume that the connection table is currently caching 3 connections, all from inside to outside. You’ll need to invent appropriate IP addresses and port numbers.
Expert Answer
[solved] – Question 91800
Visit a host that uses DHCP to obtain its IP address, network mask, default router and IP address of its local DNS server. List these values and give screenshots of how you obtained them and describe.
Expert Answer
[solved] – Question 91802
A program is required for a computer game. The user keys in the number of rounds he wishes to play.
For each round the user enters his lucky number. The program takes the number and divides it with a
secret number. If the remainder of the division is zero, it is considered a draw for the round and the total
score is incriminated by 1. Otherwise if it is any other even number, it is considered a win for the round
and the total score is incremented by 3. However if it is an odd number, it is considered a loss for the
round and the total score is decremented by 3. This is done until he completes his rounds. He wins if the
total score at the end is a positive number. Write a Java program to accomplish this.
Expert Answer
[solved] – Question 91803
Write Java application program to be used to evaluate the credit worthy of a client. The program reads
the credit limit and the price and quantity of the item to be purchased by the client. If the value of the
goods is more than the credit limit, the program displays “Sorry you cannot purchase goods worthy such
a value on credit” and allows the customer to re-enter the quantity, otherwise, displays “Thank You for
purchasing from us” and the value of the purchase. This should be repeated for n customers.
Expert Answer
[solved] – Question 91828
an application that allows a user to enter values for an array of seven Salesperson objects. Offer the user the choice of displaying the objects in order by either ID number or sales value. Save the application as SalespersonSort.java.
Expert Answer
[solved] – Question 91865
Rita wants to enter numbers at a fast pace to perform mathematical calculations . Which type of keys will you suggest her to input data from the keyboard?
Expert Answer
[solved] – Question 91883
Granting you are working in a software provider company where you develop websites or system software for companies or organizations. You have a client whos demands were unreasonable and wanted you to finish the project in a very short period of time. What will you do in order to solve this problem?
Expert Answer

