subject

It’s easy for a hacker to know what a network looks like once they get onto a network. Almost all computers have simple tools that can be used to fill in some of the blanks hackers would need in order to perform different attacks. Using ping, ipconfig/ifconfig, traceroute and nslookup, answer the following questions. Your computer should be connected to the Internet either via a wired or a wireless connection. To receive full credit, you must paste a screenshot of the tool you used to answer each question.Ÿ 1. What IP address did you receive? Ÿ 2. What is the subnet mask? Ÿ 3. What is the default gateway? Ÿ 4. What DNS servers are you resolving to? Ÿ 5. Are you able to ping espn. com? Ÿ 6. What DNS server is currently resolving espn. com? Ÿ 7. What is the IP address of the DHCP server you received your IP address from? Ÿ 8. What is the MAC address of the network interface card you are using to connect to the Internet? Ÿ 9. What is the next hop router IP address that is used after your default gateway to get to espn. com? Ÿ 10. What is the fully qualified domain name (the name) of the IP address 8.8.8.8? . Let’s block ads! (Why?)

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 10:50, Isaiahtate053
Write a 3-4 page apa formatted paper comparing your organization’s it strategy with the best practices outlined in your course text. content should include, but not be limited to: developing and delivering on the it value, developing it strategy for the business value and linking it to business metrics. your paper should include an abstract and a conclusion and a reference page with 3-5 references
Answers: 1
image
Computers and Technology, 23.06.2019 01:40, littlebirdd987
You have a linux system that has a 1000gb hard disk drive, which has a 90gb partition containing an ext4 filesystem mounted to the / directory and a 4gb swap partition. currently, this linux system is only used by a few users for storing small files; however, the department manager wants to upgrade this system and use it to run a database application that will be used by 100 users. the database application and the associated data will take up over 200gb of hard disk space. in addition, these 100 users will store their personal files on the hard disk of the system. each user must have a maximum of 5gb of storage space. the department manager has made it very clear that this system must not exhibit any downtime as a result of hard disk errors. how much hard disk space will you require, and what partitions would you need to ensure that the system will perform as needed? where would these partitions be mounted? what quotas would you implement? what commands would you need to run and what entries to /etc/fstab would you need to create? justify your answers.
Answers: 3
image
Computers and Technology, 23.06.2019 14:00, allison9746
Need ! will choose brainliest! discuss the role of abstraction in the history of computer software.
Answers: 1
image
Computers and Technology, 23.06.2019 16:00, cravens511peeelg
An english teacher would like to divide 8 boys and 10 girls into groups, each with the same combination of boys and girls and nobody left out. what is the greatest number of groups that can be formed?
Answers: 2
You know the right answer?
It’s easy for a hacker to know what a network looks like once they get onto a network. Almost all co...

Questions in other subjects:

Konu
Mathematics, 05.10.2020 01:01