Blog

Coursehelp
April 16, 2019
QUESTION : No Comments

(Solved) : Work Egs Testing Solutions Company Involved Testing Related Access Control Systems Large P Q30111494 . . .

You work for EGS Testing Solutions; your company is involved intesting related to access control systems. A large, private fitnessclub contacted your company because their Web server was hacked.The fitness club has a corporate office with 50 workstations, 4application servers, 2 e-mail servers, 2 Web servers, and 129franchisees with 10 workstations and about 3,500 members at eachlocation. Except for the equipment at the franchisees’ locations,all other equipment resides at the central headquarters.

The fitness club was unsure whether the Web server hacking tookplace because of the former administrator, who quit under less thanamenable circumstances, or if an external party had found their“Achilles heel.” The perpetrator was able to access the corporateWeb server by using the remote login of the Microsoft (MS) Windowsnetwork administrator. Once the hack was realized, theadministrator was forced to shut down the connections to all their129 franchisees that needed access to the corporate Web server. Thefranchisees require access to the Web server to review theircustomers’ personal information, fitness progress, and goals aswell as to share information with the corporate headquarters in asecure manner. Members and club staff also make periodic paymentsfor dues and services using this system, including credit cardpayments.

Your company has been engaged to provide a cost-effectivesolution that would allow the new administrator to do thefollowing:

Control access to resources by preventing unauthorized usersfrom logging in to privileged areas.

Audit and review user activities to prevent future hacks thatcould compromise network integrity.

Change the existing system to strengthen it as necessary.

Add technology, as necessary, to detect security breaches.

To be able to develop a cost-effective solution, your companymust focus on developing a reasonable and cost-effective testingplan to identify any weaknesses in the network.

Develop a comprehensive and ongoing vulnerability andpenetration test plan. Include solutions in the test plan forunauthorized access in the corporate workstations, applicationservers, mail and Web servers, and wireless routers.

Expert Answer


. . .

OR
OR

Have a Comment on this Question?

Questions viewed by other students


  • QUESTION : (Solved) : Code Must Java Programming Assume Gallon Paint Covers 350 Square Feet Wall Space Create Ap Q30914697 . . .

    Code must be in Java Programming

    Assume that a gallon of paint covers about 350 squarefeet of wall space. Create an application with a main()method that prompts the user for the length, width, and height of arectangular room. Pass these three values to a method that does thefollowing:

    Calculates the wall area for a room

    Passes the calculated wall area to another method thatcalculates and returns the number of gallons of paint needed

    Displays the number of gallons needed

    Computes the price based on a paint price of $32 pergallon, assuming that the painter can buy any fraction ofa gallon of paint at the same price as a whole gallon

    Returns the price to the main() method

    The main() method displays the final price. For example:

    You will need 2.0 gallonsThe price to paint the room is $64.0

    Expert Answer


    . . .


    view full answer
  • QUESTION : (Solved) : Code Needs Php Format Need Adderphp Home Page Answer Submitted Goes Adder2php Continue Pro Q32083100 . . .

    This code needs to be in php format. I need Adder.php to be thehome page but when the answer is submitted it goes to Adder2.phpand then will continue to the process from Adder2.php. Below is thecode and below that is how it should look.

    Adder.php

    ____________________________________________________________

    <html>

    <head>

    <title>Math Adder</title>

    </head>

    <body>

    <h3> Addition Quizer </h3>

    <form action=”Adder2.php” method=”get”>

    <?php

    $n1 = rand(0,9);

    $n2 = rand(0,9);

    ?>

    <?php echo ($n1) ?> + <?php echo ($n2) ?> =

    <input type “text” name=”answer” size=”3″>

    <input type=”hidden” name=”n1″ value= “<?php echo ($n1);?>” >

    <input type=”hidden” name=”n2″ value= “<?php echo ($n2);?>” >

    <p><input type=”submit” value=”Submit”/></p>

    </form>

    </body>

    </html>

    _____________________________________________________

    <html>

    <head>

    <title>Math Adder 2</title>

    </head>

    <body>

    <h3> Addition Quizer </h3>

    <?php $n1 = (int)$_GET[‘n1’];

    echo $n1;

    ?>

    <br>

    <form action=”Adder2.php” method=”get”>

    <?php

    $n1 = rand(0,9);

    $n2 = rand(0,9);

    ?>

    <?php echo ($n1) ?> + <?php echo ($n2) ?> =

    <input type “text” name=”answer” size=”3″>

    <input type=”hidden” name=”n1″ value= “<?php echo ($n1);?>” >

    <input type=”hidden” name=”n2″ value= “<?php echo ($n2);?>” >

    <p><input type=”submit” value=”Submit”/></p>

    </form>

    </body>

    </html>

    Adder.php Addition Quizzer Is that right? Adder2.php Addition Quizzer 1+9-0 ??.. Sorry, the answer is 10. Okay, now try again... 3+4- Is that right?

    Adder.php Addition Quizzer Is that right? Adder2.php Addition Quizzer 1+9-0 ??.. Sorry, the answer is 10. Okay, now try again… 3+4- Is that right? Show transcribed image text

    Expert Answer


    . . .


    view full answer
  • QUESTION : (Solved) : Code Needs Done C Create Class Called Record Represent Data Record Following Data Integer Q29190879 . . .

    Code needs to be done in c++

    Create a class called Record:
    ? this will represent a data record with the following data:
    ? an integer id (this will be the key)
    ? a name string (you will likely want to make this a fixed sizecharacter array)
    ? you will have the following public methods:
    ? a constructor, taking an id and a name as arguments
    ? Getters: getId() and getName()
    ? Note: You need to make sure all record objects are the same size,so you may want to
    use a character array with a fixed size, padded or truncated asnecessary, to represent the
    name.

    2. Create a class called Bucket:
    ? this will represent a bucket of records – it will have thefollowing data members:
    ? an integer, capacity, giving the number of records in abucket
    ? an array of Record objects (there will be capacity record objectsin the array)
    ? you will have the following public methods:
    ? a constructor, taking the integer capacity as an argument
    • the constructor should initialize the bucket to contain capacityempty records, where
    an empty record is identified by an id value of 0 (name valuedoesn’t matter)
    ? void setRecord(int pos, Record r) – replace the record atposition pos in the bucket with
    the given record r (pos = 0…capacity-1)
    ? Record getRecord(int pos) – return the record at position pos inthe bucket

    CSS 532 Advanced Data Structures Spring 2018

    3. Create a class called HashFile:
    ? this will represent your hash file, and it will understand how toperform hashing. It will have
    at least the following data items:
    ? the fstream or RandomAccessFile that will implement the hashfile
    ? an integer, numBuckets, representing the number of buckets in thehash file
    ? an integer, bucketCapacity, represent the number of records to bein each bucket
    ? an integer, bucketSize, representing the total number of bytes ina bucket
    ? you will have the following public methods:
    ? a constructor, HashFile(fileName, numBuckets, bucketCapacity) –this should open the
    underlying hash file, and fill it with numBuckets buckets, eachbucket containing
    bucketCapacity empty records (for our purposes, we will re-createthe hash file every
    time we run the program. This, of course, would be silly for realuse).
    ? int insert(Record r) – insert the given record r into the hashfile. Return the bucket
    number into which the record was placed.
    ? Record retrieve(int key) – retrieve the record with the specifiedkey from the hash file.
    If it does not exist in the file, return an empty record (id =0)
    ? revealTable() – retrieve each bucket, from 0 throughnumBuckets-1, and print its
    contents as follows:

    ? close() – close the underlying hash file

    Notes
    • You may use an in-memory assist, but you do not have to
    • For any errors, or if the table is full, just throw an Exceptionto terminate the program
    • Entire buckets must be read/written at once. We do not read/writeindividual records!!!

    Bucket 0
    Record 1: id=42 name=Larry
    Record 2: id=0
    Bucket 1
    Record 1: id=53 name=George
    Record 2: id=99 name=Linda
    .
    .
    .

    CSS 532 Advanced Data Structures Spring 2018
    Hashing Algorithm
    Your hash file will use a Double Hashing scheme for collisionresolution:
    • Primary hash function: key % numBuckets
    • Secondary HashFunction key % (numBuckets – 2) + 1
    Main Program
    Your main program will do the following:
    1. Construct a hash file with 7 buckets, 2 records perbucket.
    2. Loop
    ? Prompt user to enter an id and name.
    ? If id = 0, exit the loop.
    ? Create a data record using this data, and store it in the hashfile using the insert() method.
    ? Print the data record (id and name), and the bucket number wherethe record was stored
    (which is returned from the insert() method)
    3. Show the table using the revealTable() method
    4. Loop
    ? Prompt user to enter an id.
    ? If id = 0, exit the loop.
    ? Retrieve the data record with this id using the retrieve()method.
    ? If the data record is found, print the id and name.
    ? If the data record is not found, print the id and a “Not Found”message.
    Input Data – First Loop Input Data Second Loop

    id name
    ———-
    21 Albert
    10 Daniel
    55 Fred
    101 Debra
    203 Amy
    444 Bob
    700 Brenda
    600 Elmo
    78 Elizabeth
    801 Cindy

    id

    101
    999 (not found)
    21
    78
    700
    203
    888 (not found)

    Expert Answer


    . . .


    view full answer
  • QUESTION : (Solved) : Code Needs C Consider Definition Function Main Int Main Intx Y Char Z Double Rate Hours Do Q30018131 . . .

    code needs to be in c++

    Consider the definition of the function main.

    int main ()
    {
    intx, y;
    char z;
    double rate, hours;
    double amount;
    .
    .
    .
    }

    The variables x, y, z, rate, and hours referred to in items athrough f below are the variables of the function main. Each of thefunctions described must have the appropriate parameters to accessthese variables. Write the following definitions:

    a) Write the definition of the function initialize thatinitializes x and y to 0 and z to the blank character.

    b) Write the definition of the function getHoursRate thatprompts the user to input the hours worked and rate per hour toinitialize the variables hours and rate of thefunction main.

    c) Write the definition of the value-returning functionpayCheck that calculates and returns the amount to be paidto an employee based on the hours worked and rate per hour. Thehours worked and rate per hour are stored in the variableshours and rate, respectively, of the functionmain. The formula for calculating the amount to be paid isas follows: For the first 40 hours, the rate is the given rate; forhours over 40 , the rate is 1.5 times the given rate.

    d) Write the definition fo the function printCheck thatprints the hours worked, rate per hour, and the salary.

    e) Write the definition of the function funcOne thatprompts the user to input a number. The function then changes thevalue of x by assigning the value of the expression 2 times the(old) value of x plus the value of y minus the value entered by theuser.

    f) Write the definition of the function nextChar thatsets the value of z to the next character stored in z.

    g) Write the definition of a function main that testseach of these functions.

    – noncompiling (-25)
    – no documentation (-5)
    – Main is totally up to you but should indicate and test eachfunction by outputting values of parameters before the functioncall and afterward (-5 if you do not do this)
    – Not going to grade the output, going to look at the functionalityand correctness only (see below). Will be grading you based on theinterpretation of the requirements for the function and your use ofcall by value vs call by reference parameters, as well as, void andvalue returning functions.
    – initialize should take 3 parameters, 2 ints and a char. 2 intsshould be initialized to 0 and char to ‘’ or ‘ ‘. Variable passingmethod (-3), Return type of function (-2)
    – getHoursRate function should take 2 parameters: hrs and rate.Variable passing method (-3), Return type of function (-2)
    – paycheck function should take in hours and rate. Variable passingmethod (-3), Return type of function (-2) The function shouldcalculate the paycheck and include an if/else for overtimecalculation (-2 if not)
    – printCheck function should take in hours, rate, and pay asparameters. Variable passing method (-3), Return type of function(-2)
    – funcOne is a test of by value and reference. Variable passingmethod (-3), Return type of function (-2)
    – nextChar is a function that takes in a char and returns a char(the next character in the alphabet). Variable passing method (-3),Return type of function (-2)

    Expert Answer


    . . .


    view full answer