This website uses cookies to ensure you have the best experience.

# Network Port Essay

271 words - 2 pages

Option 2: Data Set Activity
Chentell Duberry
QNT 275
December 07, 2015
Dr. Kenneth C. Sherman

Student Data Set
Student | Gender | Age |
Jenny | F | 42 |
Sandy | F | 36 |
Linda | F | 29 |
Lilly | F | 54 |
Nichole | F | 32 |
Sally | F | 23 |
Lisa | F | 22 |
Brook | F | 38 |
John | M | 60 |
Dave | M | 43 |
Shawn | M | 25 |
Kurt | M | 47 |
...view middle of the document...

67 | Female : 34.5 |

Range
Male : 60-25+1 = 36 | Female : 54 – 22 + 1 = 33 |

Variance and Standard Deviation
Male:
Age | Mean | x | x2 |
60 | 43.67 | 16.33 | 266.67 |
43 | 43.67 | -0.67 | 0.4489 |
25 | 43.67 | -18.67 | 348.5689 |
47 | 43.67 | 3.33 | 11.0889 |
52 | 43.67 | 8.33 | 69.3889 |
35 | 43.67 | -8.67 | 75.1689 |

s2= x2N-1 = 771.33345=154.2665
s= s2= 154.2665=12.4201
Female:
Age | Mean | x | x2 |
42 | 34.5 | 7.5 | 56.25 |
36 | 34.5 | 1.5 | 2.25 |
29 | 34.5 | -5.5 | 30.25 |
54 | 34.5 | 19.5 | 380.25 |
32 | 34.5 | -2.5 | 6.25 |
23 | 34.5 | -11.5 | 132.25 |
22 | 34.5 | -12.5 | 156.25 |
38 | 34.5 | 3.5 | 12.25 |

s2= x2N-1 = 7767=110.8571
s= s2= 110.8571=10.52887
The distribution of Male ages has more variability than female ages but there are more female students than male students.

## Other assignments on Network Port

### Sec450 Essay

329 words - 2 pages : ------------------------------------------------- Task 3—Deny Upper TCP ports from suspicious hosts to Dallas Server Port scan packets and other malicious activities have been detected by an Instruction Detection System (IDS) deployed in Dallas LAN. They are upper TCP port packets arriving to Dallas Server from the Attack PC. #4. Your task as a network administrator is to configure an ACL in Dallas Router to prevent malicious packets entering Dallas LAN. These

### Common Ports Essay

349 words - 2 pages Common Ports Network ports are logical connections, provided by the TCP or UDP protocols at the Transport layer, for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine what protocol incoming traffic should be directed to. Some characteristics of ports are listed below: • Ports allow a single host with a single IP address to run network services. Each port number identifies a

### Funsec Slm Lab01

452 words - 2 pages during the report. Arp Ping: Discovers how many hosts are alive TCP Port Scan: Identifies open TCP ports Service Scan: Looks for fingerprint of known services by testing responses to certain types of packets Remote Operating System Scan: Fingerprints remote OS by testing responses to certain types of packets Traceroute: Discovers the IP path to the r 9. How many total IP hosts did Zenmap find on the network?

### Test

326 words - 2 pages way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers.   This can result in getting information such as the user accounts, IP addresses and   computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance

### It109

273 words - 2 pages Review Questions 1) A hardware is a six-byte data-link layer address coded into a network interface adapter. An IPv4 address is a 32-bit software setting supplied by a server or a network administrator. 2) Application sends function calls into protocol, application data is packaged and transmitted over the network through layers of the networking stack, protocol encapsulates the application layer data by adding a header containing the port number

### It Infrastructure

310 words - 2 pages scans) does the Intense Scan using ZenMap GUI perform?Port Scanning, OS detection, Version detection, Network Distance, TCP sequence prediction, Trace route5. From the ZenMap GUI pdf report page 6, what ports and services are enabled on the Cisco Security Appliance device? 443/tcp open ssl/http, No exact OS matches for host, Aggressive OS guesses: Cisco Catalyst 1900 Switch, Software v9.00.03 (89%).6. What is the source IP address of the Cisco Security Appliance device (refer to page 6 of the pdf report)? Nmap scan report for 172.30.0.17. How many IP hosts were identifie

### Test

1829 words - 8 pages ) TCP/UDP 69 Trivial File Transfer Protocol (TFTP) UDP 80 Hypertext Transfer Protocol (HTTP) TCP 110 Post Office Protocol (POP) TCP 161 Simple Network Management Protocol (SNMP) TCP/UDP 194 Internet Relay Chat (IRC) TCP 443 Secure HTTP (HTTPS) TCP 520 Routing Information Protocol (RIP) UDP Registered Port Application Protocol 1433 MS Structured Query Language (MS SQL) TCP/UDP 1812

### Computer

3676 words - 15 pages only has two BNC connectors, and is rarely seen these days.   8 Port mini Ethernet Hub The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports instead of just two BNC connectors. When data enters the hub through any of its ports, the hub amplifies the signal and transmits it out through all of the other ports. This enables a star network to have a shared medium, even though each computer has its own

### Airasia

866 words - 4 pages Solution Air Asia initially engaged Comscentre to establish an IP voice and data network between their Australian branch office in Brisbane and their Australian port bases located in Perth, Melbourne and the Gold Coast. Impressed by Comscentre’s response which created a fully managed and supported national IP voice and data network for Air Asia in Australia, Comscentre were soon rolling out IP voice and data network installations into more Air Asia

### Roles Involved In Network Security

430 words - 2 pages combination a set of tools would give me an idea about how a hacker can coordinate its intrusion to the network. There is no way to see what is in the mind of a hacker, but with the use of tools SNMP, port-scanning, port mapping, Security probes, and others that can be customized, in reality a full set of security rules in place, proper computer training, strong passwords, and constant surveying, it is possible to prevent attacks. Establishing goals

### Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

339 words - 2 pages introduction of malicious programs into networks or onto systems - No port scanning or data interception on the network - No denying service or circumventing auathentication to legitimate users - No using programs, scripts, or commands to interfere with other network users - No sending unsolicited email messages or junk mail to company recipients - No accessing adult content from company resources - No remote connections from systems failing to meet minimum security requirements

## Similar Documents

### Set Up Access Control List For A Router

527 words - 3 pages 182.62.0.0 0.0.255.255 182.64.0.0 0.0.255.255, the "0.0.255.255" is the inverse mask of network 182.62.0.0 with mask 255.255.0.0. ACLs use the inverse mask to know how many bits in the network address need to match. In the table, the ACL permits all hosts with source addresses in the 182.62.0.0 network and destination addresses in the 182.64.0.0 network. Deny Telnet Traffic (TCP, Port 23) Hostname R1 ! Interface ethernet0 IP access group 102 in

### Ping Sweeps And Port Scans Essay

1200 words - 5 pages threat on business organizations especially if they are not detected. Ping sweeps are usually conducted to establish end-points on a network, while port scans are performed to locate “open doors” in the established end-points (Teo, 2000). An individual, thereafter, can use various utilities on the internet to exploit identified “open doors” within a system and gain access to sensitive information as explained in the following paragraphs. a) Ping

### Ping Sweeps And Port Scans Essay

562 words - 3 pages Ping Sweeps and Port Scans James A. Fort SEC 280 Professor Dau July 15, 2012 Ping Sweeps and Port Scans With computer networks becoming larger hackers are looking more and more for ways to illegally gain access to our networks and procure information about our customers that they can use for their gain. Some tools that hackers are using are called ping sweeps and port scans. Now in the hands of Network Administrators these tools are not

### Case Study Week 1

600 words - 3 pages sweeps on the network by blocking the ICMP echo request from any outside source. Conversely, Address Mask Requests and ICMP Timestamp are other ways to determine a live address for an intruder to attack (Rouse, 2005). Port Scans have a major impact on computer systems because they are usually the second step of an intruder’s attack. A port scan will scan the ports on the computer system they are in the process of attacking (Conklin, White, 2010