Professional Documents
Culture Documents
HCF 203 Assignment
HCF 203 Assignment
REG#: R1711755
PROGRAM: HCF
ASSIGNMENT 3
1. BaseException class
2. Built-in Modules
3. cURL
4. socket.accept ()
5. socket.send(data,address)
6. bind(IP,PORT)
7. the sequence of function calls for a client and server participating in a UDP connection
PART B
8.
9. Port scanning refers to the act of searching for a computer's ports through the use of specialized software.
This software searches for the ''doorways'' in a computer and classifies them into one of three categories—
open, closed, or filtered. Once the port scan is complete, the user will then be able to see all of the available
ports on the target machine as well as their classification. This can be useful for security administrators who
want to see if any open ports need to be closed or filtered. However, a hacker can also use this information
to plan an attack that corresponds to a specific port's classification.
10. Nmap is used primarily for port scanning. It is therefore important to differentiate between different types
of port states available in Nmap. There are six possible port states recognized by Nmap:
Open – indicates that an application is listening for connections on the port. The primary goal of port
scanning is to find these.
Closed – indicates that the probes were received but but there is no application listening on the port.
Filtered – indicates that the probes were not received and the state could not be established.
Unfiltered – indicates that the probes were received but a state could not be established. In other words, a
port is accessible, but Nmap is unable to determine whether it is open or closed.
Open/filtered– indicates that the port was filtered or open but Nmap couldn’t establish the state.
Closed/filtered – indicates that Nmap is unable to determine whether a port is closed or filtered.
11. List down and briefly explain five factors that can cause or introduce vulnerabilities within systems?
CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security
flaws. When someone refers to a CVE, they mean a security flaw that's been assigned a CVE ID number.
Common Weakness Enumeration (CWE) list identifies software security weaknesses in software and
hardware