Preview

IT302 assignment 5

Satisfactory Essays
Open Document
Open Document
356 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT302 assignment 5
1. Answer the following questions:

a. How is vsftpd more secure than most other FTP servers?
● VSFTPD does not run with root privileges.

b. What is the difference between passive and active FTP?
● The difference between a passive and an active FTP connection lies in whether the client or server initiates the data connection. In passive mode, the client initiates the connection to the server (port 20-default(; in active mode, the server initiates the connection. Neither is inherently more secure than the other.

c. Why is ASCII transfer sometimes necessary?
● It performs conversion between different codesets

d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?
● You need to set the listen parameter to YES in the vsftpd.conf file

e. A user tries to log in, provides a user name, and gets denied. What settings would cause this and how?
● Setting /etc/vsftpd/ftpusers lists users, one per line, who are never allowed to log in on the FTP server

f. What is a directive that has on opened and closed tag instead of being a single word called?
● Containers or special directives

g. What is the ability to respond to multiple IPs or names as if the server were multiple servers called?
● virtual hosts

2. You can create virtual host by host names or IP addresses. Explain the basics of how each type works.
● IP-based virtual hosts use the IP address of the connection to determine the correct virtual host to serve. Therefore you need to have a separate IP address for each host. With name-based virtual hosting, the server relies on the client to report the hostname as part of the HTTP headers.

3. A Web administrator has just configured a virtual host and a small test page for it. However, when he tries to test his site, he gets the Fedora Apache test page rather than his own. Given the following information, what is the cause of his problem?
● The allow and deny should be reversed, Deny all is automatically denying

You May Also Find These Documents Helpful

  • Powerful Essays

    Assignment 2 Unit 29

    • 1973 Words
    • 8 Pages

    In this assignment the author will explain the contribution of complementary psychological theories to the understanding of two specific behaviours,…

    • 1973 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    If you are on a bad site such as a bad movie upload page or a smut website the hacker can use that to pass false authorization.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Research Assignment 4.1 FOSS (Free and Open Source Software) had some trouble in 2006 when Microsoft submitted 235 patents that were allegedly violated by FOSS. Microsoft created these patents in order to collect royalties from companies in the “free world” (companies/people using free software). Eben Moglen of the Free Software Foundation contended that software is a mathematical algorithm and is not patentable. Moglen wrote, “It’s a tinderbox. As the commercial confrontation between free software and software-that’s-a-product becomes more fierce, patent law’s going to be the terrain on which a big piece of the war’s going to be fought.” FOSS has powerful corporate patrons and allies. So if Microsoft ever tried to sue Linux distributor Red Hat for patent infringement, for instance, OIN might sue Microsoft in retaliation, trying to enjoin distribution of Windows.…

    • 705 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3230 Week 5 Assignment 1 – Scope of Work for Penetration Test The Fitness Club has unfortunately already been the victim of hacking that took place on their web server. They are unsure if this was due to a former disgruntled employee or if this was from a different party altogether. Malcolm Testing Solutions has been tasked with creating a penetration test plan in order to prevent future hacking attacks of attack on the Fitness Club’s network. The main objective of the assessment is to provide feedback to The Fitness Club with respect to its ability to preserve the confidentiality, Integrity, and availability of the information maintained by and used by its origination. Malcolm Testing Solutions will test the use of security controls used to secure sensitive data.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Sc300 Assignment 4

    • 1458 Words
    • 6 Pages

    Unit 4 Assignment Kaplan University SC300-12 Part 1: Energy and me Energy and me. I use several different forms of energy. The one I most often used is electricity which is generated from a power plant in my area. It is my understanding that Power plants make electricity out of other forms of energy. “Majority of electricity in the United States comes from converting the heat energy released from burning fossil fuels, such as coal, natural gas and oil. The rest is generated from nuclear reactors and from renewable sources, such as sunlight, wind, falling water and geothermal heat.” (Where does electricity come from? June 2013) I would guess that when I travel and where I work that the electricity is originated the same way.…

    • 1458 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Ba 3101- Assignment 1

    • 1138 Words
    • 5 Pages

    BA 3102 – Business, Society, & Ethics Reaction Paper 1: Drawing the Ethical Line between Right and Wrong…

    • 1138 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Hrm 3263 Assignment 3

    • 512 Words
    • 3 Pages

    -Lunch: 3.6 -Dinner: 3 2. Identify the total seating capacity and seating area for your restaurant operation.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    8. Enter the password for the username " Password " field. 9. Check the areas where the user is allowed to enter in the permission "tree".…

    • 9258 Words
    • 38 Pages
    Good Essays
  • Good Essays

    feasibility analysis

    • 663 Words
    • 3 Pages

    DESCRIPTION: One of the basic client-server services is the "echo service". The client program connects to the server over the network. After the connection is established, whatever the client sends to the server is echoed back by the server to the client. The Echo server can be either iterative or concurrent. An iterative server can serve only one client at a time. A concurrent server can handle multiple clients; each client will be handled by a separate thread.…

    • 663 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Tutorial 2

    • 493 Words
    • 3 Pages

    <Code> The <Code> tag is a phrase tag. It defines a piece of computer code. The computer code consists of declaration of header, main of the coding, and display the output of the coding.…

    • 493 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    AVM 300 Assignment 4

    • 1244 Words
    • 5 Pages

    Fall 2010 Andrew McAviney 2214 Orange Grove Place Escondido, CA 92027 amcaviney@yahoo.com Assignment #4 Abstract…

    • 1244 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Itm601 Assignment 3

    • 840 Words
    • 4 Pages

    production capacity will be allocated to a new line (Easy-Go Family) of garage doors that will…

    • 840 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Interview question new 1

    • 2158 Words
    • 11 Pages

    server, and is then able to access the webpage using the IP address. Which of the following…

    • 2158 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    Setting /etc/vsftpd/ftpusers lists users that are not allowed to log in on the FTP server…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT 240 Set 2 Week 5 DQ 1

    • 410 Words
    • 2 Pages

    This work of IT 240 Latest Version Set 2 Week 5 DQ 1 contains: What is DNS? How do users benefit from it? Provide a brief description of the DNS process to resolve a URL to its IP address.…

    • 410 Words
    • 2 Pages
    Satisfactory Essays