Professional Documents
Culture Documents
a) Consider two random scanning worms (i.e., like Code Red or Slammer) called A
and B, that each select IP addresses to infect at random (out of roughly 4
billion IP addresses on the Internet). Worm A targets a vulnerability present in
1,000,000 hosts and each worm instance targets 10 IP random addresses per
second. Worm B targets a different vulnerability present in 10,000 hosts, but
targets 1000 IP random addresses per second.
i. Assuming both worms start at the same time, after one minute which worm
do you expect will have compromised more additional hosts and why?
[4]
ii. Assuming both worms start at the same time, after one day, which worm do
you expect will have compromised more additional hosts and why?
[2]
control lists:
If Alice wants to write to File 1 giving your reasoning , state whether Alice
iii) Show how the need for a Group 3 for File 2 can be removed using
i n t p a r s e s t r i n g ( char ∗ s t r , i n t pos1 , i n t p o s 2 ) {
.
.
.
Char b u f [ 1 0 2 4 ] ;
i f ( pos2−p o s 1 > 1 0 2 4 )
e x i t ( −1 );
s t r c p y ( bu f , s t r ) ;
.
.
.
return1;
}
Figure 1 String copy code