(Solved) : Network Administrator Put Ip Address Server Said Could Always Use Ip Address Get Server Se Q41422728 . . .

Our network administrator put an IP address on the server andsaid I could always use that IP address to get to the server. Wasthe server IP address assigned Statically or Dynamically?

Expert Answer


The Server IP address is assigned statically. Since the network administrator is using the same address always to get to seve

The Server IP address is assigned statically. Since the network administrator is using the same address always to get to sever, implies that servers ip adrress is not changing ie fixed. This will happen when the IP address are assigned statically.

(Solved) : Needs Programmed C Introduction President Software Company Ceo Gmu S Bike Share Company Co Q41333804 . . .

Needs to be programmed in C.

Introduction:
You are the president of a software company.  The CEO ofGMU’s bike share company has contacted you with aproposal.  He wants your company to build a new computersystem to track and analyze bike trip operations.  Hewill send you a data set that contains bike trips made in one dayfor you to use to create a prototype. The computer system youdesign will need to process this data.

The bike share company has two types ofmembership payment plans.  Acasual rider is not registered and paysfor one bike trip at a time.  Aregistered rider signs up for a longerterm and pays a flat annual rate for unlimited rides at a lowercost. Each trip record contains the start and end bike sharestations.  A start station is alocation where riders check a bike out of a docking station whenthey begin a bike trip.  An endstation is a location where riders will check a bikeinto a docking station when they end a trip. Each record alsocontains some time variables that you can use to compute the timeand length of each trip.  The records will contain thehour that the trip started in a 24-hourclock (military time), and the minutesthat have passed during thathour.  Example:  hour = 16 and minutes = 30means that trip started at 4:30 pm. There is also aduration variable that contains thelength of time of each trip in milliseconds.  And lastbut not least, each record contains theID number of the bike that was ridden inthe trip.

In order for the CEO to run his bike share operations, yoursystem will need to process the data and provide him with thefollowing types of information:

·      The busiest time of day,when there are the most bike trips

·      The busiest stations

·      The slowest stations

·      The average time of all thebike trips

·      The longest and shortestbike trips

The CEO also needs to monitor the inventory of bikes and set upa quality control process to identify the bikes that get the mostuse so that they can be flagged for maintenance.  He hasasked you to create an inventory list of all the bikes and tracksome key metrics on each bike.  He will need to knowwhich bikes are getting the most use and where they are located atthe end of the day.

Specifications:
You are given a text file with data on trips. You will need to readthis data into an array.  Each row will contain one tripstruct with the definition provided below.

  typedef struct Trip_struct{

     char membershipType[12];

     int startStationId, endStationId,bikeId,

         duration,startHr, startMin;

  }Trip;

The order of the fields in each row is

MembershipType

StartStationId

EndStationId

BikeId

Duration

Hour

Minute

Here are the specifications for your system:

  1. Information for each trip will be kept in a single data type(struct) and will consist of:
    • A bike ID (integer)
    • A membership Type (char string of 12 characters)
    • A start station ID (integer)
    • An end station ID (integer)
    • The duration of the trip in milliseconds (integer)
    • The hour in which the trip started in military time(integer)
    • The minute at which the trip started (integer)
  2. The trip data will be read from an ASCII file at the start ofthe program. The data fields will be those listed above, separatedby white space.  Each line in the file will contain asingle struct.
  3. Use malloc to allocate space to store the trip array.
  4. After reading in the data, your system will need to providemenus that the users of your system will navigate to obtainmetrics.
  5. The metrics that users will need are as follows:
    • Average number of trips per hour
    • The hour with largest number of trips
    • A report of the count of trips in each hour
    • Average duration of the trips (in both milliseconds andminutes)
    • The trip with the longest duration (in both milliseconds andminutes)
    • The 5 busiest starting stations (that had the largest number oftrips in the day)
    • The 5 busiest ending stations (that had the largest number oftrips in the day)
    • The percentage of trips in each membership type

To create the inventory of bikes, you will use a bike structwith the definition provided below.  

typedef struct Bike_struct{

   char maintenanceFlag;

   int bikeId, endStationId;

   int numTrips, totalDuration;

float totalMinutes;

}Bike;

You will need to create a second separate array of bike structs byimplementing the following data structure and functions.

  1. Information for each bike will be kept in a single data type(struct) and will consist of:
    • A bike ID, each struct will have a unique bike ID(integer)
    • A maintenance flag (character)
      • ‘0’ default value
      • ‘1’ when flagged for maintenance
    • An end station ID (integer)
    • The number of trips (integer)
    • The total duration of all the trips for this bike(integer)
    • The total minutes of all the trips for this bike (float)
  2. You need to create an array of bike structs.  Makethe size of the array 4,000 elements.  This will providesome empty rows for adding new bikes to the inventory.
  3. Creating a list of unique bike IDs can be done in the followingsteps:
    • Sort the trip array by bike ID using a quick sortalgorithm
    • Create an empty bike array of 4,000 bike structs
    • Write a function that loops through the trip array, copyingonly unique bike IDs into the bike array
    • Write a function that loops through the trip array and updatesthe rest of the data members in each bike struct
  4. The CEO of the bike share company has requested the followingmetrics on the bike inventory:
    • The 10 bikes with the longest duration in minutes
    • Where the 10 bikes above are located at the end of the day
    • The 10 bikes with the most trips
    • How many bikes were only used for 2 or less trips
    • For the bikes with 2 or less trips, make a list of the startstation IDs and the number of trips for each of these stations
  5. The CEO has also requested that your system is able to add andremove bikes from the inventory list

Implementation:
The specifications for this project have a great deal of detail.However, the fact that they are detailed can be used to youradvantage, in that you can break the project into smaller units andwork on them separately to create the complete project.

  1. You will implement this program using arrays of structs. Youwill read data from an input text file into anarray.  Then you will use the data in this array tocreate a second separate array of 4,000 bike structs.
  2. You will need to be able to sort the arrays by any given datamember using quick sort.
  3. Your program will be menu driven. As you create and workthrough your menus, use stubs as place holders until you write thecode. The program will contain a main menu, and several choicesfrom this menu will bring up a sub-menu. See the MenuSpecifications below.
  4. An input file containing the trip data is provided.
  5. A sample script and sample output will hopefully be providedthat you may test with your program (depending upon time). Ifprovided, your program must respond to inputs in the same mannerthat the sample script responds. In other words, your programshould not add unnecessary prompts for user input, nor should itskip prompts for input (or prompt for multiple data items with asingle prompt). If the script cannot be provided in a timely manner(approximately one week before the due date), then this requirementwill not be necessary.

Menu Specifications:

  • Main Menu: The main menu will contain thefollowing choices and functionality:
    1. Read Trip Data
      1. Prompt the user for a file name containing the trip data.
      2. Open this file and read the information from the file, creatingan array of Trip structs.
      3. If the file cannot be found, print a message stating this fact,and return to the Main Menu.
    2. Run Metrics
      1. Display the Metrics Menu (See below)
    3. Print Menu
      1. Display the Print Menu (See below)
    4. Flag Bikes for Maintenance
      1. Make a list of the 10 bikes with the longest duration
      2. Update the maintenance flag to ‘1’
    5. Update Bike Inventory
      1. Add a bike
      2. Remove a bike
    6. Quit
      1. Exit the program
  • Metrics Menu:
    1. The user is presented with a list of metrics from thespecifications above
      1. The program prompts the user to choose a metric.
      2. The program prompts the user to choose whether to display themetric on the screen or write the result to an output file.
      3. If an output file is chosen, the program prompts the user totype in the name of the output file.
    2. Return to Main Menu
  • Print Menu:
    1. Print All the Trip Data
      1. The program prompts the user to choose whether to display themetric on the screen or write the result to an output file.
      2. If an output file is chosen, the program prompts the user totype in the name of the output file.
      3. Return to Main Menu
    2. Print All the Bike Inventory
      1. The program prompts the user to choose whether to display themetric on the screen or write the result to an output file.
      2. If an output file is chosen, the program prompts the user totype in the name of the output file.
      3. Return to Main Menu
    3. Print the CEO Report
      1. The program prompts the user to type in the name of the outputfile.
      2. All the metrics for the trips and the bikes are printed to theoutput file in a nicely formatted style that is easy to read.
      3. Return to Main Menu
    4. Print one Bike
      1. The program prompts the user to enter a bike ID
      2. The program prompts the user to choose whether to display themetric on the screen or write the result to an output file.
      3. If an output file is chosen, the program prompts the user totype in the name of the output file.
      4. Return to Main Menu

Expert Answer


(Solved) : New Employee Came Office Today Network Administrator Gave Ip Address Printer Gave Last Mon Q41422756 . . .

A new employee came into our office today. The NetworkAdministrator gave her the same IP address for the printer that shegave me last month. Was the server IP address assigned Staticallyor Dynamically?

Expert Answer


The Printer IP address is assigned statically. Since the network administrator gave the same address that was used last month

The Printer IP address is assigned statically. Since the network administrator gave the same address that was used last month, implies that ip adrress is fixed. This will happen when the IP address are assigned Statically.

(Solved) : Needed Matlab Solution Got Answer Need 1 Short Summary Method Work 2 Plots Demonstrate Re Q41384300 . . .

I needed a Matlab solution so I got this as an answer and now Ido need this.

1)Short summary of how method work.

2) Plots that demonstrate your results, e.g. iteration vs. x,iteration vs. f(x) and iteration vs. error.

3) Do not tabulate results of the all iterations, usegraphs.

4)Discuss what is happening when you reduce the tolerance andchange the intervals.

Solution:

a)

Bisectionmethod

clc
clear all
close all
format long
xl=[0,0];
xu=[2,10];
errs=[1e-6,1e-8,1e-10];
for ii=1:length(xl)
for jj=1:length(errs)
f = @(x) x^3+2*x^2+10*x-20;
e=1e-6;
a=xl(ii);
b=xu(ii);
iter = 0;
  
if f(a)*f(b)>=0

disp(‘No Root’)

else

prev = (a+b)/2;
p=a;
while (abs(f(p))>errs(jj))
prev=p;

iter =iter+ 1;

p = (a+b)/2;

if f(p) == 0
p
q=1
break;

end

if f(a)*f(p)<0

b = p;

else

a = p;

end
if(iter==100)
disp(‘the required accuracy is not reached in 50iterations’);
end
end

end
fprintf(‘For Lower value=%d, upper value=%d, err=%.2e, theapproximate root is %f and iterations are%dn’,xl(ii),xu(ii),errs(jj),p,iter);
end
  
end

- O X Pradeep VIEW do E C . Search Documentation D EDITOR PUBLISH Insert E fx EH - Comment % 92% Breakpoints Indent & EDIT Ru

We were unable to transcribe this image- O X Pradeep VIEW do E C . Search Documentation D EDITOR PUBLISH Insert E fx EH – Comment % 92% Breakpoints Indent & EDIT Run Section 8 Run Run and Advance Advance Aduan RUN Run and Time BREAKPOINTS O ох Editor – C:UsersPRADEEP KALRADocumentsMATLABsaveee.m saveee. mx googleLinks. mx chegg1. mx chegg2. mx else testcm x eulerSystem. m x ahk. mx bisectionmethodbypradeep.m x + 1 MATLAB R2018a HOME PLOTS APPS + G C Find Files 3 Compare – Go To – New Open Save Print Find FILE NAVIGATE a Windows System32 Current Folder Name 0409 1029 1033 1036 1040 1045 1046 1049 1055 3082 Advancedinstallers af-ZA am-et AppLocker appraiser Details a = p; L L LLLLL end if(iter==100) disp(‘the required accuracy is not reached in 50 iterations) end end end fprintf(‘For Lower value=&d, upper value=$d, err=$.2e, the approximate root is $f and iterations are $dn’,xl(ii end < O Workspace end Name b Value 1.3688 1.3688 1.0000e-06 [1.0000e-06, 1.0000e-… @(x)x^3+2*x^2+10* … Command Window New to MATLAB? See resources for Getting Started. H errs For Lower value=0, upper value=2, err=1.00e-08, the approximate root is 1.368808 and iterations are 30 For Lower value=0, upper value=2, err=1.00e-10, the approximate root is 1.368808 and iterations are 38 For Lower value=0, upper value=10, err=1.00e-06, the approximate root is 1.368808 and iterations are 24 For Lower value=0, upper value=10, err=1.00e-08, the approximate root is 1.368808 and iterations are 34 For Lower value=0, upper value=10, err=1.00e-10, the approximate root is 1.368808 and iterations are 39 39 1.3688 script O9 Type here to search In 58 Col 4 ENG 7:08 PM 0 IN 10/23/19 Z- ” Show transcribed image text
– O X Pradeep VIEW do E C . Search Documentation D EDITOR PUBLISH Insert E fx EH – Comment % 92% Breakpoints Indent & EDIT Run Section 8 Run Run and Advance Advance Aduan RUN Run and Time BREAKPOINTS O ох Editor – C:UsersPRADEEP KALRADocumentsMATLABsaveee.m saveee. mx googleLinks. mx chegg1. mx chegg2. mx else testcm x eulerSystem. m x ahk. mx bisectionmethodbypradeep.m x + 1 MATLAB R2018a HOME PLOTS APPS + G C Find Files 3 Compare – Go To – New Open Save Print Find FILE NAVIGATE a Windows System32 Current Folder Name 0409 1029 1033 1036 1040 1045 1046 1049 1055 3082 Advancedinstallers af-ZA am-et AppLocker appraiser Details a = p; L L LLLLL end if(iter==100) disp(‘the required accuracy is not reached in 50 iterations) end end end fprintf(‘For Lower value=&d, upper value=$d, err=$.2e, the approximate root is $f and iterations are $dn’,xl(ii end

Expert Answer


(Solved) : Network Design Security 6 18 Points Asked Consult Network Security Small Health Clinic S Q41428536 . . .

Network Design and Security 6 ..................... .............. 18 points You have been asked to consult on the network se

Network Design and Security 6 ………………… ………….. 18 points You have been asked to consult on the network security of the small health clinic shown in the diagram below. All computers in the clinic are on the same Local Area Net- work (LAN), which uses a small cisco router to connect to the Internet. The medical record database is stored on a dedicated linux computer also on the LAN, and is ac- cessed by all the office computers except the payroll computer. A WiFi Network is used by employees to access the LAN with their cell phones, and to provide a guest network for patients. The fishtank is not on any network, but a manufacturer supplied cellphone APP is used to monitor its temperature by staff. The clinic also supports a public web server which is used for patient appointments, to advertise times for Flu shots and other public announcements. Office Fishtank with Bluetooth Thermometer Medical Record Database Local Area Network for Clinic Firewall Office Computers Payrol Computer Internal Web Server Public Web Server DMZ (a) (2 points) What is the purpose of the Demilitarized Zone(DMZ)? (b) (2 points) Is one firewall sufficient? (c) (4 points) The clinic’s WWW address was recently used in a phishing attack, after attackers altered its public DNS record via a DNS cache poisoning exploit. Explain what happened, and how the clinic could prevent this from happening again. (d) The Blueborne(CVE-2017-1000251) attack, announced in September 2017, allows an attacker to install and run malicious code on affected bluetooth devices without any interaction with the user. The attack has been sucessfully demonstrated on all major computer and mobile phone platforms, and many other bluetooth devices. The attack can also propagate itself to other bluetooth devices. Assume that none of the Bluetooth devices in the Clinic have been patched. i. (2 points) Explain how an attacker on the Guest network could probe for local bluetooth devices. ii. (4 points) Explain all the steps in a plausible attack that uses the office fishtank to attack the payroll computer and extract data to a visitor’s laptop. (e) (4 points) Given that the Cisco router provides support for Virtual Lans (VLAN), draw and label a diagram showing how to reorganise the network to provide better security for the payroll computer. You may add additional named devices if you wish, and should provide a brief explanation for the reasons for your changes. Show transcribed image text Network Design and Security 6 ………………… ………….. 18 points You have been asked to consult on the network security of the small health clinic shown in the diagram below. All computers in the clinic are on the same Local Area Net- work (LAN), which uses a small cisco router to connect to the Internet. The medical record database is stored on a dedicated linux computer also on the LAN, and is ac- cessed by all the office computers except the payroll computer. A WiFi Network is used by employees to access the LAN with their cell phones, and to provide a guest network for patients. The fishtank is not on any network, but a manufacturer supplied cellphone APP is used to monitor its temperature by staff. The clinic also supports a public web server which is used for patient appointments, to advertise times for Flu shots and other public announcements. Office Fishtank with Bluetooth Thermometer Medical Record Database Local Area Network for Clinic Firewall Office Computers Payrol Computer Internal Web Server Public Web Server DMZ (a) (2 points) What is the purpose of the Demilitarized Zone(DMZ)? (b) (2 points) Is one firewall sufficient? (c) (4 points) The clinic’s WWW address was recently used in a phishing attack, after attackers altered its public DNS record via a DNS cache poisoning exploit. Explain what happened, and how the clinic could prevent this from happening again. (d) The Blueborne(CVE-2017-1000251) attack, announced in September 2017, allows an attacker to install and run malicious code on affected bluetooth devices without any interaction with the user. The attack has been sucessfully demonstrated on all major computer and mobile phone platforms, and many other bluetooth devices. The attack can also propagate itself to other bluetooth devices. Assume that none of the Bluetooth devices in the Clinic have been patched. i. (2 points) Explain how an attacker on the Guest network could probe for local bluetooth devices. ii. (4 points) Explain all the steps in a plausible attack that uses the office fishtank to attack the payroll computer and extract data to a visitor’s laptop. (e) (4 points) Given that the Cisco router provides support for Virtual Lans (VLAN), draw and label a diagram showing how to reorganise the network to provide better security for the payroll computer. You may add additional named devices if you wish, and should provide a brief explanation for the reasons for your changes.

Expert Answer


A. The purpose of the DMZ is to let the untrusted users enabledto the internet and let them away from the organization network.Thus in this way, we can enable the internet for our guests as wellwithout compromising the security for our office networkcomputers.

B. No one firewall is not sufficient for this case, we need tohave one more firewall in order to protect the payroll computer sothat it is not accessible by the office computers which can be doneby adding one more firewall in front of the payroll computer.

C. In this exploit the DNS entries are changed in order to letthe office computers land to the wrong address. Thus the IP addressconversion of the webpage will be different than the original oneand thus the user will be landing to the wrong address.
In order to prevent this from happening again, the organizationshould create own DNS server and serve the office computers onlythe required entries and disregard the remaining entries. This willhelp the organization computers to not go to the otheraddresses.

D. a. An attacker can get connected to the local network andthen it can use the Bluetooth attack in order to install and runthe malicious program on the user’s computer.

Being a Cheggexpert, I am obliged to do only four subparts of a question at atime.
I hope you understand.
Thanks

(Solved) : Needs Done Java Exercise Need Use Online Database Remotely Accessible Create Spring Boot P Q41338807 . . .

Needs to be done in Java.

For this exercise you need to use your own online database thatis remotely accessible. Create a Spring Boot project that manages asmall zoo. In your database you need to have a table with zooanimals. This table needs to contain at least 10 animals, withattributes Id, AnimalType, AnimalName, Age. Your Spring Bootapplication needs to display the animals in a list or table. Theuser needs to be able to add an animal to the list/table, anddelete an animal from the list/table. You can not use JavaFX forthis Homework. Submit the entire project folder as a zip file, sowhen opened and loaded in IntelliJ, one can immediately start thewebserver your SpringBoot application sets up, and navigate to yourpage through localhost in the browser. Use port 8088 as defaultport.

UI can be done using Jfeonix and DB can be done with somethingfree like HelioHost.

Expert Answer


(Solved) : Need Write Program C Use Visual Studio Console App Create Application Accepts Sentence Inp Q41355276 . . .

I need to write this program in C# (I use Visual Studio, and itcan just be a console app):  

Create an application that accepts a sentence as input andconverts each word to “Pig Latin.” To convert a word to Pig Latinyou remove the first letter and place that letter at the end of theword. Then you append the string “ay” to the word. Here is anexample:

English: I SLEPT MOST OF THE NIGHT

Pig Latin: IAY LEPTSAY OSTMAY FOAY HETAY IGHTNAY

but i need to add a few parameters:

** Your program should also display the number of words in theoriginal sentence **

** Your program should count and display the number of vowels(a,e,i,o,u) in the original sentence **

** If your original sentence has any numeric digits, replace thenumber with an asterisk (*).

and I want to make it so each parameter is in it’s ownmethod.

Thank you!!!!

Expert Answer


(Solved) : Network Communication Course 1 Suppose Message 1001 1100 1010 0011 Transmitted One Methods Q41338473 . . .

network and communication course :

1. Suppose that a message 1001 1100 1010 0011 is transmitted andone of the methods
below is used.
a. Odd-parity bit: At receiver side, it receives 1001 1100 00100011 0. Is the
message received correctly? Explain your answers.
b. Internet Checksum (4-bit word):
i. What is the transmitted message? Explain your answers.
ii. If the receiver received 1001 1100 0011 1010 1011. Is thereany
error detected? WHY? Explain your answers.
c. If the sender and receiver agree upon using even-parity bitHamming code
on every 8-bits. What will the transmitted message be.

Expert Answer


1 a)Since in odd parity, the parity bit is made either a 0 or 1so that the total number of 1’s is an odd number.

Here message received is 1001 1100 0010 0011 0

The message received is incorrect.There is presence of an errorif the parity of the receiver signal is different from the expectedparity. That means, if it is known that the parity of thetransmitted signal is always going to be “even” and if the receivedsignal has an odd parity, then the receiver can conclude that thereceived signal is not correct.In this case parity should have been1.

b) i)For calculating checksum we add all 4 bit pairs,Here 1001 +1100 + 1010 + 0011 = 100010.

Carry is added to the LSBs: 0100. Then by finding out one’scomplement value we get checksum,which is 1011 .

Transmitted message is hence 1001 1100 1010 0011 1011 .

ii)receiver received message : 1001 1100 0011 1010 1011

Now to check if there is any error we will again add all the 4bit pairs including checksum,On adding we get1001+1100+0011+1010+1011=0101111

Now we take one’s complement,which will be 1010000.

Here on taking complement we do not get negation (which shouldbe 0000000).Hence there was error sending message and it needs tobe resent.

(Solved) : Network Design Security 6 18 Points Asked Consult Network Security Small Health Clinic S Q41403493 . . .

Network Design and Security 6 ..................... .............. 18 points You have been asked to consult on the network se

Network Design and Security 6 ………………… ………….. 18 points You have been asked to consult on the network security of the small health clinic shown in the diagram below. All computers in the clinic are on the same Local Area Net- work (LAN), which uses a small cisco router to connect to the Internet. The medical record database is stored on a dedicated linux computer also on the LAN, and is ac- cessed by all the office computers except the payroll computer. A WiFi Network is used by employees to access the LAN with their cell phones, and to provide a guest network for patients. The fishtank is not on any network, but a manufacturer supplied cellphone APP is used to monitor its temperature by staff. The clinic also supports a public web server which is used for patient appointments, to advertise times for Flu shots and other public announcements. Office Fishtank with Bluetooth Thermometer Medical Record Database Local Area Network for Clinic Firewall Office Computers Payrol Computer Internal Web Server Public Web Server DMZ (a) (2 points) What is the purpose of the Demilitarized Zone(DMZ)? (b) (2 points) Is one firewall sufficient? (c) (4 points) The clinic’s WWW address was recently used in a phishing attack, after attackers altered its public DNS record via a DNS cache poisoning exploit. Explain what happened, and how the clinic could prevent this from happening again. (d) The Blueborne(CVE-2017-1000251) attack, announced in September 2017, allows an attacker to install and run malicious code on affected bluetooth devices without any interaction with the user. The attack has been sucessfully demonstrated on all major computer and mobile phone platforms, and many other bluetooth devices. The attack can also propagate itself to other bluetooth devices. Assume that none of the Bluetooth devices in the Clinic have been patched. i. (2 points) Explain how an attacker on the Guest network could probe for local bluetooth devices. ii. (4 points) Explain all the steps in a plausible attack that uses the office fishtank to attack the payroll computer and extract data to a visitor’s laptop. (e) (4 points) Given that the Cisco router provides support for Virtual Lans (VLAN), draw and label a diagram showing how to reorganise the network to provide better security for the payroll computer. You may add additional named devices if you wish, and should provide a brief explanation for the reasons for your changes. Show transcribed image text Network Design and Security 6 ………………… ………….. 18 points You have been asked to consult on the network security of the small health clinic shown in the diagram below. All computers in the clinic are on the same Local Area Net- work (LAN), which uses a small cisco router to connect to the Internet. The medical record database is stored on a dedicated linux computer also on the LAN, and is ac- cessed by all the office computers except the payroll computer. A WiFi Network is used by employees to access the LAN with their cell phones, and to provide a guest network for patients. The fishtank is not on any network, but a manufacturer supplied cellphone APP is used to monitor its temperature by staff. The clinic also supports a public web server which is used for patient appointments, to advertise times for Flu shots and other public announcements. Office Fishtank with Bluetooth Thermometer Medical Record Database Local Area Network for Clinic Firewall Office Computers Payrol Computer Internal Web Server Public Web Server DMZ (a) (2 points) What is the purpose of the Demilitarized Zone(DMZ)? (b) (2 points) Is one firewall sufficient? (c) (4 points) The clinic’s WWW address was recently used in a phishing attack, after attackers altered its public DNS record via a DNS cache poisoning exploit. Explain what happened, and how the clinic could prevent this from happening again. (d) The Blueborne(CVE-2017-1000251) attack, announced in September 2017, allows an attacker to install and run malicious code on affected bluetooth devices without any interaction with the user. The attack has been sucessfully demonstrated on all major computer and mobile phone platforms, and many other bluetooth devices. The attack can also propagate itself to other bluetooth devices. Assume that none of the Bluetooth devices in the Clinic have been patched. i. (2 points) Explain how an attacker on the Guest network could probe for local bluetooth devices. ii. (4 points) Explain all the steps in a plausible attack that uses the office fishtank to attack the payroll computer and extract data to a visitor’s laptop. (e) (4 points) Given that the Cisco router provides support for Virtual Lans (VLAN), draw and label a diagram showing how to reorganise the network to provide better security for the payroll computer. You may add additional named devices if you wish, and should provide a brief explanation for the reasons for your changes.

Expert Answer