Linux 2 Use the book as a guide, install the dns service on your VM. Construct a zone for richrules.net referencing hosts according to the table below. Also construct a hosts file entry ( outside the zone) to resolve nowhere.richrules.net to 198.209.214.1. Your zone should reference the following services utilizing these hosts www server named www.at 150.199.110.174 an ftp server named ftp1 colocated with the www server the primary email server at 72.167.218.172 a www server named inside at 10.0.0.1 Submit configuration file and your hosts file, along with screenshots demonstrating the ping command resolves to the proper addresses.
Q: a, X/XX a,Z/XZ b.x/2 b.X/2 λZ/Z qo q1 (92) What are the strings accepted by this PDA? A. A B. aa C.…
A: Approach to solving the question: Understand the PDA Components: Identify the states, transitions,…
Q: What is specified by a relational schema? (A) The number of arguments in a query B Limits of the…
A: The objective of the question is to understand what is specified by a relational schema in the…
Q: Assign Q9’s row and column indices to Q10 and Q11, respectively
A: Assuming you have some data structure where Q1-Q12 represent elements, there are two ways to achieve…
Q: let petsData = ; let categories = ['Length', 'Height', 'Weight']); let canvasWidth = 800; let…
A: The objective of the question is to convert the given p5.js code into JavaScript to generate a…
Q: The objective is to simulate virtual memory paging and evaluate the performance of different page…
A: Implementation of Page Replacement Algorithms:import random from collections import deque class…
Q: 8) Compare and contrast the Waterfall and Agile system development models, highlighting their key…
A: The Waterfall model splits the project lifecycle into discrete phases and is a sequential and linear…
Q: Draw an E-R diagram based on the following relational design.SeniorTeachers(teacherId, name, dept,…
A: Here's the E-R diagram based on the provided description:``` +-----------------+…
Q: Question: Given an array of integers, find the maximum sum of contiguous subarray (containing at…
A: Initialize max_sum and current_sum to the first element of the array.2. Iterate through the array…
Q: Q2- Reset bits 1,4,6 of A and set bits 3,5 when A=03BH Instruction MVI A,4E MVI D,20 ORA D ANI 16…
A: Sure, The image you sent me shows a circuit with several components, including resistors,…
Q: (v) Using the rule of the above grammar, using leftmost derivation (or using a rightmost derivation)…
A: v):- vi):- AD 111 S B C sa AD sa B b c StaD S = abC sabDc Sabel 5 abc S - abc since two left most…
Q: Assume that the population of Mexico is 128 million and the population of the United States is 323…
A: Prompt the person to go into the percent annual boom for the populace of Mexico as a decimal.Prompt…
Q: I need help with this Java problem to output as it's explained in the image below:…
A: Detailed explanation:The above code defines a BXT class to handle Binary Expression Trees. It can…
Q: Assume the following shows the initial contents of registers and memory locations: REGISTER CONTENTS…
A: 1. Initial State: Before the program starts executing, the registers and memory have initial values.…
Q: with the use of SQL/PL, trace the execution of the following Sorting algorithms for array: {16, 21,…
A: Approach to solving the question: Detailed explanation:let's trace the execution of each of these…
Q: 2. The VGA specifications give the following details for the parts of a single horizontal scan:…
A: The objective of the question is to calculate the total time for a complete horizontal scan line,…
Q: Alert dont submit AI generated answer.
A: Approach to solving the question: Detailed explanation: Step 1 of 4 Introduction: The question…
Q: * AHPA #23: Rounding Grades * * You are responsible for a class with five students: Tim, Mary,…
A: The given task revolves around managing the scores of students in a class and performing operations…
Q: Define a numpy array representing the matrix and assign it to the variable B. 7 -6 −1 11 5 -6 -12 14…
A: Step 1: Import the necessary libraries import numpy as np from…
Q: Instructions: Program and solve the following tasks in a script file; publish it as a PDF and submit…
A: Detailed explanation:The supplied MATLAB script tackles the assignment of computing letter grades…
Q: provide me all the files with all the functions implemented with proper code.file: fscMalloc.h…
A: It seems you've provided the structure and function prototypes for a memory allocation system but…
Q: Why is the pipelined hash join not commonly used in a conventional DBMS? (A) It immediately produces…
A: The question is asking about the reasons why pipelined hash join is not commonly used in a…
Q: 2. Which variables in mpg are categorical? Which variables are continuous? Mapa continuous variable…
A: In the context of a dataset like mpg, which typically refers to a dataset containing information…
Q: Holiday Travel Vehicles sells new recreational vehicles and travel trailers. When new vehicles…
A: Step 1:Based on the scenario provided, we can identify the following classes along with their…
Q: I need help with this Java problem to output as it's explained in this image below: This part…
A: Source code screenshots for reference: Output screenshot: Code explanation walkthrough:…
Q: Please help me with this question. I am not understanding what to do. Please complete part 2 for the…
A: //Please note that the code given below is properly executable and testified before passing it to…
Q: This program involves inputting multiple data items (temperatures) that are each within a certain…
A: NOTE: Just replace "Your Name" with your actual name. PROGRAM EXPLANATION:Imports and Class…
Q: Please help me create a cave class for a Hunt the Wumpus game (in java). You can read the rules in…
A: In this question we have to write a Cave class which need to be designed for a "Hunt the Wumpus"…
Q: Some lines in the file have a line number, as shown in the following figure. A line number is the…
A: The task is to create a Java program called RemoveLineNumber.java that removes line numbers from a…
Q: PLEASE DON'T USE STRUCTS Using C programming language write a program that simulates a variant of…
A: Here's a C program that simulates the Tiny Harvard Architecture as described:```c #include…
Q: Write a python function that takes a list of characters as an argument and prints allthe vowels in…
A: The objective of the question is to create a Python function that identifies and prints all the…
Q: Which of the following data structures is best suited for implementing a Last-In-First-Out (LIFO)…
A: The data structure best suited for implementing a Last-In-First-Out (LIFO) behavior is: Option (B)…
Q: Look at my code, What can you say about the computational complexity of…
A: The computational complexity of the count_crossings_and_nestings function can be analyzed by looking…
Q: Thinking about Data Mining As implied in the text, data mining boils down to making sense of bits of…
A: The practice of extracting knowledge and patterns from massive volumes of data is called data…
Q: please help me out with by step solution thanks
A:
Q: ___is the problem of finding structured data items that describe the same real-world entity.…
A: The question is asking to identify the process that involves finding structured data items that…
Q: C Sharp, I am trying to get my console to display the vehicle information, by using a base class of…
A: Hope this helps
Q: 1. define a function with one parameter and no return value. Add code to print out the value of the…
A: Function with One Parameter and No Return Value:Define a function named print_parameter_value that…
Q: Alert dont submit AI generated answer.
A: 1. **Intercept**: The intercept represents the baseline log odds of the response variable when all…
Q: Write a program in C as follows:- Create an array of integers named “toy” that has 120 rows and 4…
A: The objective of the question is to create a C program that manages a toy bag. The program should be…
Q: What is specified by a relational schema? (A) The number of arguments in a query B Limits of…
A: Within a database context, a relational schema may be thought of as a blueprint or plan that…
Q: I need help regardign this question and please dont use AI
A: Approach to solving the question:To approach solving this question, you can follow these…
Q: This is a java question do what in the question says please and do it on your own dont plagarise or…
A: For this task, we will define a class that will implement some base Object class methods to perform…
Q: 1. Construct a truth table for the following: a) xyz + (xyz) b) x(y + xy)
A: The objective of the question is to construct truth tables for the given logical expressions: a) x…
Q: Which is true of stacking structures? Each structure has only one point where it can be stacked on…
A: We need to write the what is the true statement about the stacking structure. So we will see in the…
Q: 1. Create a variable called NUMBER and assign the value 9 to it 2. Create an IF statement that will…
A: 1. Start2. Initialize a variable called NUMBER and assign the value 9 to it3. Check if the value of…
Q: 2. Please write in complete sentences For a certain trap generated by an agent, it is desired to…
A: STEP BY STEP ANSWER:Answer:v1v2TrapForwardingTable or v2ManagerTableIf you are creating SNMPv1 or…
Q: Create a R script to do the following• Create a vector ‘x’ with values from 100 to 109.• Create a…
A: The objective of the question is to create two vectors 'x' and 'y' in R, and then add these two…
Q: PROGRAM 5: Big Number! Write an HLA Assembly language program that prompts for n, an int8 value, and…
A: Let's break down each program and provide further explanation:Program 5: Big Number!This program…
Q: c. The code fragment below computes a table of maximum values over fixed sub-ranges of a given list.…
A: The provided code fragment aims to compute a table of maximum values over fixed sub-ranges of a…
Q: // Reads the contents of the specified local image // into a byte array. byte[] byteData =…
A: References Redmon, J., & Farhadi, A. (2018). Yolov3: An incremental improvement. arXiv preprint…
Alert dont submit
Step by step
Solved in 2 steps
- Create 2 new virtual machines and perform clean installation of CentOS 7 Linux Server with GUI on both machines. Your local Subnet number is Subnet# 192.168.200. ………. /28 The first Linux Server will have the following characteristics: Host Name: linuxsrvXX (where XX is two last digits of student1 number) Static IP Address: For server’s IP Address, use the first number from available range of hosts addresses Connect first Linux Server to Internet Install a DHCP Package from Internet using yum command. Disconnect Linux Server’s Internet access. Set Static IP Address: For DHCP server’s IP Address, use the first number from available range of hosts addresses Create a DHCP Pool for 10 Computers/Client PCs from the given Subnet Number The second linux Computers will have the following characteristics: Host Name: Linuxclient-XX (where XX is two last digits of one student2 number) IP Address: It will obtain IP Address from DHCP ServerShell Script # 5 - NetworkTest.sh Create a fifth script called (NetworkTest.sh). This script will have one subroutine. 1. The subroutine will check if the system is online (Connected to the internet). If the system is connected to the internet, then perform the following: Ping the loopback IP address. Ping the gateway with 8 packets each packet is 1KB. Query the Domain Name System to qu.edu.qa. Save the results in a file called /tmp/PINGRESULTS.TXT. ● ● Otherwise, perform the following: • Ping your local machine. ● Display IP configuration and Routing Table of your Machine. Store results in a file called /tmp/NETINFO.TXT Finally reboot the system automatically after 20 seconds.Please build a web server on your Raspbery Pi virtual host and publish a dynamic website that shows the characteristics of your virtual system and data about you as a current user i.e. Web page with information about the version of the operating system, what modules are configured and working, which interfaces are included (HDMI, USB, etc.), user name, time login etc. (at least 6 parameters). Complete the web page with a survey for the loT class! You have complete freedom for a design of the web page!
- You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user charlie? sudo cat /var/log/vsftpd.log grep “charlie” /var/log/vsftpd.log sudo grep “charlie” /var/log/vsftpd.log cat /var/log/vsftpd.logCreate a web server that Accepts and processes request messages submitted from browser, and Generates and sends response messages back to browser for display. Your web server must be able to handle URL with hostname and port Request message URL: 0.0.1:3000 Response message: “SUCCESS!” URL with hostname, port and path echo Request message URL: 0.0.1:3000/echo Response message: “SUCCESS! echo” URL with hostname, port, path foxtrot and route parameter value kilo Request message URL: 0.0.1:3000/foxtrot/kilo Response message: “SUCCESS! Received kilo via foxtrot” where the value kilo must be retrieved via the route parameter Invalid/unexpected URL Request message URL: 0.0.1:3000/<any other value> Response message: “FAILED! Fix your URL.” Hostname 127.0.0.1 can be replaced by localhost. Port number 3000 can be replaced by any other port number that is from 1024 (2^11) to 65535 (2^17 – 1) inclusive.You are examining an Apache server, and see the following configuration: <VirtualHost *:443>ServerName webserverDocumentRoot /var/www/webserverSSLEngine onSSLCertificateFile /etc/ssl/certs/webserver.crtSSLCertificateKeyFile /etc/ssl/private/webserver.key</VirtualHost> What would you expect the hostname of the computer to be?
- Q10: Complete the frames (x & y) given below with appropriate port, IP and MAC addresses. The sender Host E has two applications running; one for email with port number 49254 and the other for accessing the web server with port number 52167. The frame x is intended for the BRACU Web server and frame y is coming from the Email Server. (MAC addresses are alphabets and IP addresses are numbers) Port 80 BRACU Web Frame x Server A/20 B/21 Frame X D. Mac Frame Y D. Mac Switch-PT Switcho C/22 S. MAC S. MAC BRACU G/51, Router F/25 Frame y Switch-P Switch1 D/23 D. IP D. IP ISP Router 1/91 H/52 E/24 Sender S. IP S. IP Hub-PT Hubo D. Port D. Port K/93 Port 25 Email Server 3/92 S. Port S. Port Data Data Trailer TrailerCreate 2 new virtual machines and perform clean installation of CentOS 7 Linux Server with GUI on both machines. Your local Subnet number is Subnet# 192.168.200. ………. /28 The first Linux Server will have the following characteristics: Host Name: linuxsrvXX Static IP Address: For server’s IP Address, use the first number from available range of hosts addresses Connect first Linux Server to Internet Install a DHCP Package from Internet using yum command. Disconnect Linux Server’s Internet access. Set Static IP Address: For DHCP server’s IP Address, use the first number from available range of hosts addresses Create a DHCP Pool for 10 Computers/Client PCs from the given Subnet Number The second linux Computers will have the following characteristics: Host Name: Linuxclient-XX IP Address: It will obtain IP Address from DHCP ServerIL PCAP Scanner alert udp any 61348 -> any any (content: "109 69 63 61 6e 68 61 7a 69 70 03 63 6f 6d 001; msg: "DNS Test"; Sid:1000001) Question Number 2 Scan The scan results for your snort rule will be displayed below. There is a problem with your rule. Check the alerts below to determine what went wrong and then try again. Something went wrong with your snort rule. Check the Syntax Syntax error please help! Create a rule to detect DNS requests to 'icanhazip', then test the rule with the scanner and submit the token. O X
- 1. Which of the following is not usually implemented in the server-side code? a. Routing Code b. All of these are usually implemented in Server-Side Code c. Authentication Logic Code d. User Interface Code 2. True or False. The fetch method can only be used to make GET requests. a. True b. False 3. True or False. Node.js is a asynchronous event-driven framework. This means it can only handle one event at a time a.True b. False 4. When using the router level middleware in express, what must match for the Handler Method to be executed? a. None of these b. Path and URL c. Request and Response d. Method and Path2- Client is connecting a server via TCP to get an object from HTTP Server. Skitch the TCPwindow connection including (establishing connection, the request from client, the response byserver, sending data from server side and closing the connection).Knowing that:1- Get request from the HTTP 1.1 server is 259 bytes.2- Response from the server is 223 bytes.3- Data size requested is 900 bytes.Active sockets: Use the command netstat /? to explore the parameters that can be used with it. Then use netstat –n -a to display all current sockets (all connections and listening port). Choose one of the established connections and supply the following information: The server side normally has well-known port number, below 1024. What is the established protocol or service for the server port number you found above? (Search in Google for “port number list” or “well-known port numbers”)