Question

discuss how an aftacker might uss or gain information from an ip address and explore how...

discuss how an aftacker might uss or gain information from an ip address and explore how network address translation (NAT) can help to hude an internal netwroks information

Homework Answers

Answer #1

Ans. Your IP address could be used to gain valuable information about you. Your IP address is essential for sending and receiving information online. If a attacker knows your IP address they can use it to seize very valuable information like your location, online identity. Someone can even use your IP address to hack your device, can hit you with a dos attack.

NAT can only be initiated in the internal network and NAT helps you to hide one or more IP address on your internal network behind an IP address that you want to make public.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
a) An IP address is a number that uniquely identifies a device within a computer network....
a) An IP address is a number that uniquely identifies a device within a computer network. This address can be derived from a General Network Address. i. Using any network address of your choice, explain how you would generate IP addresses by subnet masking. ii. Briefly explain the concept of Host Address and Network Address.
In a class C subnet, we know the IP address of one of the hosts and...
In a class C subnet, we know the IP address of one of the hosts and the subnet mask as given below: IP Address: 198.48.82.176 Subnet mask: 255.255.255.224 1) What is the first valid host address in the subnet? (in dotted decimal) 2) What is the last valid address in the subnet? (in dotted decimal) 3) What is the subnet network address? (in dotted decimal) 4) What is the subnet broadcast address? (in dotted decimal) 5) What is the number...
Explain how Network Address Translation allows multiple nodes within a LAN to share one Internet facing...
Explain how Network Address Translation allows multiple nodes within a LAN to share one Internet facing IP address
Using the following information (Machine’s IP=33.32.31.30, Machine’s Netmask=/29, Parent’s Netmask=255.255.240.0 ), determine a. how many bits...
Using the following information (Machine’s IP=33.32.31.30, Machine’s Netmask=/29, Parent’s Netmask=255.255.240.0 ), determine a. how many bits are used for host number on the child network (subnet) b. how many usable addresses can exist on this child network (subnet) c. what the first usable address is on this child network (subnet) d. what the last usable address is on this child network (subnet) e. what the child network’s (subnet's) broadcast address is f. what the child network's (subnet's) network number is...
What is your IP address before and after you connect to the internet How can you...
What is your IP address before and after you connect to the internet How can you get a dynamic IP address
What command discards the IP address? What command do you use to determine whether you can...
What command discards the IP address? What command do you use to determine whether you can reach another computer on the local network? Would this command work if the default gateway were down? When troubleshooting problems with resolving domain names to IP addresses, flushing the DNS cache can sometimes help so that the local computer must build the cache again. What is the command to flush the DNS cache? What command would you use to display information about name resolutions...
Don't copy answer from previous answers Suppose an ISP has the following IP address block: 130.12.128.0/23....
Don't copy answer from previous answers Suppose an ISP has the following IP address block: 130.12.128.0/23. Assume that the ISP wants to divide its address block (130.12.128.0/23) into two equal-sized contiguous address blocks, and give one of these address blocks to its customers (C1 and C2). Provide network addresses (of the form a.b.c.d/x) for C1 and C2. Now let’s assume that the ISP wants to divide its address block (130.12.128.0/23) into four equal-sized contiguous address blocks, and give one of...
Discuss how the humanistic theorists (Rogers, Maslow, and Frankl) might respond to this question from a...
Discuss how the humanistic theorists (Rogers, Maslow, and Frankl) might respond to this question from a potential client: "I have been a patient of Dr. Steve Smith, who is a psychoanalyst. He feels that I need three years of therapy to explore my id-ego conflicts (He said I need to regress back to my childhood repressions, whatever that means). I am feeling somewhat depressed, and feel that no one likes me. I think I'm too much of a loner, although...
Discuss how the cognitive theorists (Kelly, Beck, and Ellis) might respond to this question from a...
Discuss how the cognitive theorists (Kelly, Beck, and Ellis) might respond to this question from a potential client: "I have been a patient of Dr. Steve Smith, who is a psychoanalyst. He feels that I need three years of therapy to explore my defense mechanisms (he said I need to regress back to my childhood repressions, whatever that means). I am feeling depressed, and have even thought of committing suicide. I feel that no matter what I do, I'm just...
Given a network of Class B, how many bits should be borrowed from the HostID in...
Given a network of Class B, how many bits should be borrowed from the HostID in order to build 100 subnets with 200 host in each one of them? Given an IP address 138.112.25.60, with the mask 255.255.255.240: Calculate the network address and broadcast address of the network it belongs to. For 138.112.25.47 and 38.112.25.49, which one is in the same network as 138.112.25.60 does, and which one is not. Show the necessary calculation steps and explanation.