Preview

IT302 Assignment 5.1

Satisfactory Essays
Open Document
Open Document
308 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT302 Assignment 5.1
1. Answer the Following Questions
a. How is vsftpd more secure than other FTP server? vsftpd is more secure than other FTP servers because it does not run root privileges making it more difficult to compromise the system directly.

b. What is the difference between passive and active FTP?
The difference between a passive and an active FTP connection is the that in passive mode, the client initiates the connection to the server (on port 20 by default). In active mode, the server initiates the connection, having no default port.

c. Why is ASCII transfer sometimes necessary?
ASCII transfer is sometimes necessary in order to performs conversion between different code sets.

d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?
Set the listen parameter to YES in the vsftpd.conf file

e. A user tries to log in, provides a user name, and gets denied. What settings would cause this and how?
Setting /etc/vsftpd/ftpusers lists users that are not allowed to log in on the FTP server

f. What is a directive that has an opened and closed tag instead of being a single word called?
Directive that has an opened and closed tag instead of being a single word is a container

g. What is the ability to respond to multiple IPs or names as if the server were multiple servers called?
Virtual Hosting

2. You can create virtual hosts by host names or IP addresses. Explain the basics of how each type works.
IP-based virtual hosts use the address of the connection to decide the correct virtual host to connect to. In order for name-based virtual hosting to work, the server depends on the client to deliver the hostname as part of the HTTP headers. Many different hosts can share the same IP address using this method.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    It uses IP addresses because it allows to config your setting easier and it would allow you to customize your setting.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw204Week4

    • 1310 Words
    • 6 Pages

    Section 1Subnetting IP Address, Configuring Static Routes and Static Host Table - 15 Points * Task 6: Step 1 * Related Explanation or Response * Task 6: Step 3 * Related Explanation or Response * Task 6: Step 5 * Related Explanation or Response * Task 6: Step 6 * Related Explanation or Response * Summary Paragraph…

    • 1310 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    It260 Midterm Study Guide

    • 629 Words
    • 3 Pages

    9 – Which feature of IIS7 is used to associate each incoming request w/ one particular Web Site, helping the protocol listener to identify each site request?…

    • 629 Words
    • 3 Pages
    Good Essays
  • Good Essays

    DHCP With an increase in TCP/IP nets the ability to assign IP client tactics regularly for a careful time period has relieved the sore procedure of IP address organization. Network managers can now mechanize and switch from a dominant location the job of IP address patterns using the Dynamic Host Control Protocol.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Web Architecture for P1

    • 1038 Words
    • 5 Pages

    A proxy server, also known as a "proxy" or "application level gateway", is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as…

    • 1038 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Just like Windows, Ubuntu used TCP/IP. IPv4 and IPv6 are available. Ubuntu also can use DNS for name resolution. IP addressing can be configured for DHCP to receive an IP address from an DHCP server…

    • 1499 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Although, this is a new software for me to use, I think that I will be accustomed to using it once I get more and more familiar with it. I think that it is a great idea to be able to drag and drop rather than typing in all the coding, which is what the textbooks have taught me to do so far. Dreamweaver is probably going to eliminate a lot of the manual coding that is needed when creating a website, so I believe that this may make a developer/programmer become lax if they don’t practice at times.…

    • 372 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Internet Servers (also commonly known as Web Servers), primarily function to deliver web pages on request to clients. When a user types a domain name into their browser, or clicks on a link, the request is first sent to a Domain Name Server (DNS). DNSs are servers that hold databases full of domain names and IP addresses. When a DNS receives a request, it matches the domain name (ie, www.CriketX.com) to the IP address of the server that holds all of the files that make up that particular website and sends that information back to the user’s browser. The browser can then send a request for those files to the IP address of the web server (205.134.224.227 for www.CriketX.com). If the site is hosted at a dedicated IP address, then the site can actually be accessed by simply typing in the IP address of the server and skipping the DNS server altogether. In the case of www.CriketX.com, the site is hosted on a shared server, so typing in 205.134.224.227 will not take the user to the site itself, but to a landing page on that server for requests that cannot be handled. Typing in the domain name serves two purposes in the case of shared hosting. First of all, it finds the IP address of the server, and also tells the server what directory the user is looking for. This allows the server to return the site that the user is looking for. Without domain names, shared hosting would be impossible and there would be a lot more web servers than there are today. When it comes to picking a server to host a web site, one of the big considerations is what operating system the server is running. This can make a world of difference in speed, compatibility, and reliability.…

    • 1169 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    • ipchains -A input -p tcp --dport 21 -j REJECT, akan memblokir koneksi ke port 21 (ftp)…

    • 2062 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    9. Check the areas where the user is allowed to enter in the permission "tree".…

    • 9258 Words
    • 38 Pages
    Good Essays
  • Powerful Essays

    Delmonprint Case Study

    • 1032 Words
    • 5 Pages

    File Transfer Protocol (FTP) is recommended in order to store the backup of the website by copying the whole public_html folder into a local PC. FileZilla, CuteFTP or SmartFTP can be used to transfer files to a local PC.…

    • 1032 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    In order to transfer files from one user to another, the network (the internet in most cases) uses a protocol known as FTP or file transfer protocol. However, FTP is not designed to be a secure protocol and has many weaknesses.…

    • 1556 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Ftp File Transfer Protocol

    • 1199 Words
    • 5 Pages

    FTP is built on a client-server architecture and uses separate control and data connections between the client and the server.FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead, but is technologically different.…

    • 1199 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    hello

    • 505 Words
    • 4 Pages

    You will need to have your FTP settings on hand in order to use Windows XP Network…

    • 505 Words
    • 4 Pages
    Powerful Essays