**PLEASE ANSWER ALL QUESTIONS**
Calliope is a forensics detective with a law enforcement agency. She discovers that an attacker who has just been caught was using a dead-drop method of controlling the bots in a botnet. Which of the following might have been a clue that the attacker was using this method?
a. |
Finding devices that the attacker had hidden on multiple victims’ company networks |
|
b. |
Finding a directional antenna and Wi-Fi setup that allowed the bot herder to beam communications directly to the target computers |
|
c. |
Finding an e-mail account with multiple saved drafts that were never sent but contained instructions the bots were to follow |
|
d. |
Reading log files that contained constant encrypted communications from the attacker’s IP address to some of the identified bots |
Belvais performing an audit of the e-mail server when she discovers that one of the accounts is sending a lot of e-mails all day that contain attachments. After a bit more research, she finds that the attachments contain extensive proprietary and confidential information. Which of the following should she consider implementing to prevent a reoccurrence?
a. |
Buffer filtering |
|
b. |
DLP |
|
c. |
PoS |
|
d. |
Access point probe |
Alika has just finished eradicating a piece of malware from a computer system. Which of the following might she do next as part of the validation process?
a. |
Secure erase |
|
b. |
Patching |
|
c. |
Reconstruction |
|
d. |
Reimaging |
Jaden has received an alert from a system that has identified potential malware on itself. Upon looking through the log files, he sees a list of error messages where an executable tried to write data to a range of memory addresses that did not exist for the system. Which of the following has most likely occurred?
a. |
Space overflow |
|
b. |
Decimal overflow |
|
c. |
Buffer overflow |
|
d. |
Integer overflow |
Victoria, a cybersecurity analyst, has just disconnected a computer from the network after finding that it was infected with malware. Which of the following is the next task that she should attempt to perform with the system?
a. |
Containment |
|
b. |
Patching |
|
c. |
Eradication |
|
d. |
Validation |
In: Computer Science
SQL is our language for relational databases - do you think it's an adequate "language" for database creation and manipulation?
In: Computer Science
By using javaFX as the GUI, design and implement java based algorithms using appropriate data structures for the following problem:
Use depth-first search to find paths to all the vertices in a graph that are connected to a given start vertex s. A sample input file containing the number of vertices, number of edges and a list of edges called tinyCG.txt is provided for you to test your program.
In: Computer Science
Write a program that reverses a text file by using a stack. The user interface must consist of 2 list boxes and 3 buttons. The 3 buttons are: Read - reads the text file into list box 1. Reverse - reverses the items in list box 1 by pushing them onto stack 1, then popping them from stack 1 (in the reverse order) and adding them to list box 2. Write - writes the contents of list box 2 to a new text file. At first, only the Read button is enabled. After it is clicked, it is disabled and the Reverse button is enabled. After it is clicked, it is disabled and the Write button is enabled. After it is clicked, it is disabled. The name of the input text file is "input.txt". The input text file will contain no more than 100 lines of text. This fact is not needed by the program. It simply means that memory usage is not an issue. The name of the output text file is "output.txt". Notes: 1. The name of your main class should be ReverseFileViaStack. 2. Use the Java class library Stack class for your stack. 3. Use a border layout for your contents pane. 4. In the north region include the following title: Reverse a Text File via a Stack. 5. Use a panel in the center region to contain the 2 list boxes (side-by-side). 6. Place the 3 buttons in the south region. 7. A useful resource for this project is the week 5 video: Java GUI List Components
In: Computer Science
In Linux system, explain step by step what the following commands do:
mkdir test
cd test
cp /etc/fstab .
ls
ls -l
touch foo ./-l
ls
ls -l
Then execute the following command:
ls *
Explain the result. What is the problem?
Execute the following command:
rm *
Explain the result. What is the problem?
Modify the "rm *" command so that it works correctly. Explain your solution.
In: Computer Science
In: Computer Science
In: Computer Science
You can use the "cat" command to list the content of a file. For example:
cat /etc/fstab
lists the content of the file /etc/fstab in the terminal window that you are currently using.
If you use a redirection of the standard output of the "cat' command:
cat /etc/fstab > foo
then a file named "foo" is created in the local directory and the content of the file /etc/fstab is listed by the "cat" command into the file "foo", which then contains a copy of the content of the file/etc/fstab. In that case, no output is printed to the terminal.
Execute the following command:
cat /etc/fstab > /dev/tty
What is the result? Explain why (do a search in the Unix manual: man -f tty for some help).
In: Computer Science
Write a Java program that accepts a sequence of commands and print out the number of successful insertions, the number of successful deletions, the number of successful searches (through the “find” command), the number of items remaining in the list after executing all commands and the final contents of the list.
Three commands that will be taken as inputs are “insert”, “delete” and “find”.
Input
Line 1: The number of transactions m on the list, where 1 m 200.
Line 2 to m+1: A string command (“insert”, “delete”, “find”) followed by an integer n (separated by a space).
Output
Line 1: Display 4 integers (each number is separated by a space) which are:
Line 2: The final contents of the list after executing all commands.
Sample Input |
Sample Output |
3 insert 1 delete 5 find 2 |
1 0 0 1 [ 1 ] |
8 find 10 insert 3 insert 2 insert 1 delete 4 delete 3 insert 1 find 2 |
4 1 1 3 [ 1 1 2 ] |
In: Computer Science
Write a function called 'make_triangle(char,n)' that uses a nested loop to return a string that forms a triangle. The return string should contain: one instance of char on the first line, two instances of char on the second line, and so on up to n instances of char on line n. Then n-1 instances of char on line n+1, and so on until the triangle is complete. Sample runs of the function looks as follows (this function called from IDLE, please note the end of line character at the end of the return string):
>>> make_triangle("+",6)
'+\n++\n+++\n++++\n+++++\n++++++\n+++++\n++++\n+++\n++\n+\n'
>>> make_triangle('*',3)
'*\n**\n***\n**\n*\n'
From IDLE, we could as print out the actual triangle as follows:
>>> print(make_triangle("+",6))
+
++
+++
++++
+++++
++++++
+++++
++++
+++
++
+
>>> print(make_triangle('*',3))
*
**
***
**
*
In: Computer Science
In: Computer Science
Topic of Discussion
“The implementation of realistic time management plans can improve productivity and the quality of life”.
As a project manager, discuss the key steps for creating realistic and successful time management plans.
In: Computer Science
Do a walk-through of the following program segments and determine, in each case, the exact output:
a) int i, j;
for (i = 1; i <= 5; i++)
{
for (j = 1; j <= 5; j++)
cout << setw (3) << i;
cout << endl;
}
b) int i, j;
for (i = 1; i <= 5; i++)
{
for (j = (i + 1; j <= 5; j++)
cout << setw(5) << j;
cout << endl;
c) int i, j;
for (i = 1; i <= 5, i++)
{
for (j = 1; j <= i; j++)
cout << setw(3) << j;
cout << endl;
In: Computer Science
Java Programming:
Scan a file and set up 3 different arrays from scanning through the .txt file. you should have 2 string arrays and 1 integer array.
I need help knowing how to read the file so that it puts the correct information into an array. It is all separated by spaces.
.txt file:
S SABQ138 3
A AABQ205 2
S SABQ127 1
A AABQ313 2
S SABQ126 2
A AABQ302 2
In: Computer Science
Java guessing game:
For this program you will use Linear Search.
- Ask the user to choose between a number from 0 to 2000.
- The user will guess how long the linear search will take in nanoseconds,
- After the user puts in their answer, show the user the difference between the actual answer and their answer.
(Example: The user puts in 5 nanoseconds. The actual time is 11 nanoseconds. The program will show 6 nanoseconds.)
There should be a class for the program to do the Linear Search and a separate tester class for the user questions and answers.
In: Computer Science