dis10

 

  1. What is K-means from a basic standpoint?
  2. What are the various types of clusters and why is the distinction important?
  3. What are the strengths and weaknesses of K-means?
  4. What is a cluster evaluation?

Prepare a professional cover letter

Assignments Content

there are 3 sections of a cover letter that are required when writing a professional cover letter to include with your resume:

Introductory paragraph (to attract the potential employer’s attention)

Main Body (to highlight and draw attention to your skills)

Closing paragraph (to ask for an interview)

Using the lecture notes above, the video in this week’s discussion forum, and sources from the internet, write and submit a cover letter for a job you are interested in applying for. You can use indeed.com, careerbuilder.com, LinkedIn, or look for job opening on a company’s website to find a job opportunity that interest you. Be sure to include a copy of the job posting with your cover letter.

https://www.youtube.com/watch?v=HG68Ymazo18 [Title: Top Interview Tips: Common Questions, Nonverbal Communication & More] 

https://www.youtube.com/watch?v=rAIXkf8WOlk [Title: Good interview, bad interview]

 

complete the following questions in an MS Word

  

.complete the following questions in an MS Word Document in APA format. Double space your work and place in 12 point font using Times New Roman. You must include both a separate cover and reference page.
 

1. (counts double) The following information is listed for the configuration of a router: Internet Port:
MAC Address – 00:21:3D:AE:2C:A6
IP Address – 70.115.23.137
DHCP – DHCP Client
IP Subnet Mask – 255.255.240.0
Domain Name Server – 209.18.47.61, 209.18.47.62
LAN Port:
MAC Address – 00:21:3D:AE:2C:A5
IP Address – 192.168.1.1
DHCP – OFF
IP Subnet Mask – 255.255.255.0
 

a. The two MAC addresses are different. What is a MAC address, and why are the two different even though this is a single router?
 

b. The two IP addresses are different. What is an IP address, and why are the two different even though this is a single router?
 

c. Since DHCP is disabled on the router, it is not assigning addresses on the LAN. If setting a static IP address for a device on the LAN, what range of addresses could be utilized?
 

d. After choosing an unused address from the range given in d for the IP address for a device on the LAN, what would the IP subnet mask and gateway be set to? Explain why these settings would be used.
 

2. List at least four services that are part of the internet and differentiate what each facilitates. You should include the World Wide Web as one of your four services.
 

3. For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information, and DHCP and DNS Information for each network connection (all NICs in each computer as well as all network device connections). Based on this information, explain the flow of information in and configuration of this network.

Using Kali VM to scan Metasploit 3 Machines with multiple tools and reporting results.

 

Here we will be scanning with Metasploit and using 2 scanners and one of your own choice.

Remember scanners are located under auxiliary/scanner

  • TCP Scanner – 10 points
  • use auxiliary/scanner/portscan/tcp
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • UDP Probe – 10 Points
  • use auxiliary/scanner/discovery/udp_probe
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • Scan of your choice – 10 Points
  • Review the scanners and choose at least 1 scanner to scan both of your metasploitable machine with. Remember one is Linux and the other is Microsoft so not all scanners work with both.
  • Capture the returned information – cut and paste and add it to your report

Rubric:

  • Captured returned results from tcp scanner for both machines – 10 Points
  • Captured returned results from udp_probe scanner for both machines – 10 Points
  • Captured returned results from for both machines – 10 Points

Encryption Questionnaire

 

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Computer Science Capstone Assignment

Please view uploaded Assignment Instructions. The excel file uploaded already has everything required, all you need to do is follow the instructions and input the information. No need to create a new excel file from scratch.