Preview

IT302 assignment 5

Satisfactory Essays
Open Document
Open Document
356 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT302 assignment 5
1. Answer the following questions:

a. How is vsftpd more secure than most other FTP servers?
● VSFTPD does not run with root privileges.

b. What is the difference between passive and active FTP?
● The difference between a passive and an active FTP connection lies in whether the client or server initiates the data connection. In passive mode, the client initiates the connection to the server (port 20-default(; in active mode, the server initiates the connection. Neither is inherently more secure than the other.

c. Why is ASCII transfer sometimes necessary?
● It performs conversion between different codesets

d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?
● You need to set the listen parameter to YES in the vsftpd.conf file

e. A user tries to log in, provides a user name, and gets denied. What settings would cause this and how?
● Setting /etc/vsftpd/ftpusers lists users, one per line, who are never allowed to log in on the FTP server

f. What is a directive that has on opened and closed tag instead of being a single word called?
● Containers or special directives

g. What is the ability to respond to multiple IPs or names as if the server were multiple servers called?
● virtual hosts

2. You can create virtual host by host names or IP addresses. Explain the basics of how each type works.
● IP-based virtual hosts use the IP address of the connection to determine the correct virtual host to serve. Therefore you need to have a separate IP address for each host. With name-based virtual hosting, the server relies on the client to report the hostname as part of the HTTP headers.

3. A Web administrator has just configured a virtual host and a small test page for it. However, when he tries to test his site, he gets the Fedora Apache test page rather than his own. Given the following information, what is the cause of his problem?
● The allow and deny should be reversed, Deny all is automatically denying

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    The difference between a passive and an active FTP connection is the that in passive mode, the client initiates the connection to the server (on port 20 by default). In active mode, the server initiates the connection, having no default port.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Fitness Club has unfortunately already been the victim of hacking that took place on their web server. They are unsure if this was due to a former disgruntled employee or if this was from a different party altogether. Malcolm Testing Solutions has been tasked with creating a penetration test plan in order to prevent future hacking attacks of attack on the Fitness Club’s network. The main objective of the assessment is to provide feedback to The Fitness Club with respect to its ability to preserve the confidentiality, Integrity, and availability of the information maintained by and used by its origination. Malcolm Testing Solutions will test the use of security controls used to secure sensitive data.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FOSS (Free and Open Source Software) had some trouble in 2006 when Microsoft submitted 235 patents that were allegedly violated by FOSS. Microsoft created these patents in order to collect royalties from companies in the “free world” (companies/people using free software). Eben Moglen of the Free Software Foundation contended that software is a mathematical algorithm and is not patentable. Moglen wrote, “It’s a tinderbox. As the commercial confrontation between free software and software-that’s-a-product becomes more fierce, patent law’s going to be the terrain on which a big piece of the war’s going to be fought.” FOSS has powerful corporate patrons and allies. So if Microsoft ever tried to sue Linux distributor Red Hat for patent infringement, for instance, OIN might sue Microsoft in retaliation, trying to enjoin distribution of Windows.…

    • 705 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    If you are on a bad site such as a bad movie upload page or a smut website the hacker can use that to pass false authorization.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Itm601 Assignment 3

    • 840 Words
    • 4 Pages

    production capacity will be allocated to a new line (Easy-Go Family) of garage doors that will…

    • 840 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT 240 Set 2 Week 5 DQ 1

    • 410 Words
    • 2 Pages

    What is DNS? How do users benefit from it? Provide a brief description of the DNS process to resolve a URL to its IP address.…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ba 3101- Assignment 1

    • 1138 Words
    • 5 Pages

    Business decision making is derived from our ethical duties. Ethics is referred to as a set of rules and principles that determine our behavior of right from wrong. Morality the subset of ethics is a set of standards that define our character. It is a personal belief that people abide by and practice accordingly. Each is used as a foundation when deciding which philosophical perspective to follow.…

    • 1138 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Assignment 2 Unit 29

    • 1973 Words
    • 8 Pages

    In this assignment the author will explain the contribution of complementary psychological theories to the understanding of two specific behaviours,…

    • 1973 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Blocking Websites

    • 1267 Words
    • 6 Pages

    Computers have a host address of their own - it is known as the "localhost" address, with an IP address of 127.0.0.1 which it uses to refer to itself. If you associate another computer's host name with your localhost IP address, you have effectively blocked that host since all attempts to access it will lead back to you. That is how we will block sites using the Hosts file. We will tell our computer that the IP address of the site we want to block is our own address. That way, our computer will not ever leave and go looking for the site we are blocking - which keeps that site from appearing because the computer thinks it has found the site and displayed it already.…

    • 1267 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Tutorial 2

    • 493 Words
    • 3 Pages

    The <Code> tag is a phrase tag. It defines a piece of computer code. The computer code consists of declaration of header, main of the coding, and display the output of the coding.…

    • 493 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It 240

    • 1902 Words
    • 6 Pages

    Domain name systems (DNS) allows for an IP address to be assigned to a computer name or domain name. This system stores given names paired with IP addresses, which make identifying a computer on a network that much simpler. DNS follows an top-down heiratage, starting at the root on to top level, secondary level, subdomain level (optional), and host level. Each of these levels are separated by periods in the IP address. For example, .edu (top level), phoenix (secondary), classroom (subdomain), and https:// (host).…

    • 1902 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Interview question new 1

    • 2158 Words
    • 11 Pages

    server, and is then able to access the webpage using the IP address. Which of the following…

    • 2158 Words
    • 11 Pages
    Good Essays
  • Good Essays

    9. Check the areas where the user is allowed to enter in the permission "tree".…

    • 9258 Words
    • 38 Pages
    Good Essays
  • Better Essays

    Domain Name Server

    • 1989 Words
    • 6 Pages

    Computers and other network devices on the Internet use an IP address to route our request to the site we're trying to reach. This is similar to dialing a phone number to connect to the person we're trying to call. Though, we don't have to keep your own address book of IP addresses. Instead, we just connect through a domain name server, also called a DNS server or name server, which manages a massive database that maps domain names to IP addresses.…

    • 1989 Words
    • 6 Pages
    Better Essays
  • Good Essays

    feasibility analysis

    • 663 Words
    • 3 Pages

    One of the basic client-server services is the "echo service". The client program connects to the server over the network. After the connection is established, whatever the client sends to the server is echoed back by the server to the client. The Echo server can be either iterative or concurrent. An iterative server can serve only one client at a time. A concurrent server can handle multiple clients; each client will be handled by a separate thread.…

    • 663 Words
    • 3 Pages
    Good Essays