Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Need part B, C and D answered. Let\'s examine each one The name of the first col

ID: 3870407 • Letter: N

Question

Need part B, C and D answered.

Let's examine each one The name of the first column, Proto, stands for protocol and is either TCP or UDP TCP and UDP are two types of network protocols in the Internet. Notice that the TCP lines all end with either ESTABLISHED or LISTENING for a state. ESTABLISHED connections are those that are actively being used to transfer data. The LISTENING connections are not currently being used to transfer data but they represent server software that is ready to accept and respond to requests should they arrive. The foreign and local address portions of each line are composed of two portions separated by a colon - an IP address and a port number. The IP address indicates the numerical address of the computer on which the network software is running. The port number indicates the "mailbox" number on that particular computer for that particular service or network conversation. You can investigate each type of server running on your machine For example, consider the first line: TCP 0.0.0.0:135 0.0.0.0:0 LISTENING It says that a service is listening on TCP port 135. a. What type of service typically runs on TCP port 135? b. What are some computer viruses that have exploited flaws in this service? Do a complete investigation of each service running on your computer. List the services. c. A group called the Internet Assigned Numbers Authority decides what services run on what ports. d. What is the term used to describe the ports assigned by the Internet Assigned Numbers Authority?

Explanation / Answer

B. what are the computer virus that have exploited flaws in this service

Answer : Blaster Worm Virus - is also refered as MSBlast or Lovsan. On the computer systems, running the operating systems it spreads the worm virus. It affects the computer and it has been propagated from one system to another with the computer which is affected by the worm virus.

C. Do a complete investigation of each service on your computer. List the services.

Answer:

D. A group called the Internet Assigned Numbers Authority decides what services run on what ports.

Answer: Port numbers are of User Port, System port and Dynamic port, Ebery port is assigned with a port number. with the help of the given port number, we can identify that what type of port it s? Some ports are called as unknown port which has identified by the port numbers which has been assigned by the IANA

Example:

port 49 - Login Host Protocol

port 80 - is used for HTTP

port 546 - DHCP Client

port 547 - DHCP Server

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote