Answer:
The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology
, extended analysis of all stages
Explanation:
Solution
Penetration testing has several methodologies which include :OSSTMM and PTES
The comparison between OSSTMM and PTES is stated as follows:
OSSTMM:
Security assessment methodology
More Theoretical
Metrics based
PTES
:
Technology oriented
Penetration testing methodology
Extended analysis of all stages
Now,
There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)
- Pre-engagement Interactions
Now,
The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.
The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.
Six areas are covered by OSSTMM which are:
-
Internet technology security
WAN domain which stands
for Wide Area Network and consists of the Internet and semi-private
lines.
The <span>RISKS
are: Service provider can have a major network
outage, Server can receive a DOS or DDOS attack</span>
and A FTP server can allow anonymously uploaded illegal software.
Answer:
<u>The total time elapsed from the time a bit is created (from the original analog signal at Host A) until the bit is decoded (as part of the analog signal at Host B is </u><u>25.11 ms</u>
Explanation:
Host A first converts the analog signal to a digital 64kbps stream and then groups it into 56-byte packets. The time taken for this can be calculated as:
time taken 1= 
= (56 x 8) bits / 64 x 10³ bits/s
= 7 x 10⁻³s
time taken 1= 7 ms
The transmission rate of the packet from Host A to Host B is 4 Mbps. The time taken to transfer the packets can be calculated as:
time taken 2= (56 x 8) bits / 4 x 10⁶ bits/s
= 1.12 x 10⁻⁴ s
time taken 2= 112 μs
The propagation delay is 18 ms.
To calculate the total time elapsed, we need to add up all the time taken at each individual stage.
<u />
<u> = Time taken 1 + Time taken 2 + Propagation Delay</u>
= 7 ms + 112 μs + 18 ms
= 0.025112 s
= 25.11 ms
Answer:
B. blocking I/O
Explanation:
Most of the input and output request placed to the computer considers the blocking request. It means that the controls given cannot be returned to the given application until and unless the input/output is complete.
Thus, blocking the input/output does not return till the input and output is complete.
With a blocking I/O, the process is moved to a wait queue when the I/O request is made, and it moved backs to the ready queue as soon as the request is complete, thereby allowing the other processes to run in the meantime.
Thus (B) blocking I/O is the answer.
Ok we will do it for you cause they are very mean