Sie sind auf Seite 1von 2

Danica Jean D.

Cañas

BSCoE

1. How does DNS works? DNS (Domain Name System) works as a converter. Example, the
browser want to go in ‘www.thanks.com’, so it will connect to the DNS to check the IP Address of
the said website, when DNS Server doesn’t have the cache of the said website it will
connect/consent other DNS Server then give it back to the first DNS Server to convert the domain
name into IP Address. So the browser will take that IP Address and then directly go into that
website.

2. How does IIS works? IIS (Internet Information Server) has its own process. The client will send
the request to the IIS and then it will process those information request by the client(web
browsers). After processing, it will send back the appropriate response from the server.

3. IP Address (Public vs. Private), IPv4, IPv6? Public IP Address is an IP address that can be
accessed over internet. Like postal address used to deliver a postal mail to your home, a public IP
address is the globally unique IP address assigned to a computing device. Private IP address, on
the other hand, is used to assign computers within your private space without letting them
directly expose to the Internet. For example, if you have multiple computers within your home
you may want to use private IP addresses to address each computer within your home. The IPv4
address is a 32-bit number that uniquely identifies a network interface on a machine. An Internet
Protocol Version 6 address (IPv6 address) is a numerical label that is used to identify a network
interface of a computer or a network node participating in an IPv6 computer network.

4. Name 3 best practices which you can protect your system.

• Encrypt all data transmitting over the Internet - all datas must not been given to the internet.
There must be an encryption for every data given by the client. For this instances, the client is
comfortable and confident to use the system.

•Strengthen Authentication Procedure - upon giving the password, be wise enough and the
system must give two-factor authentication process, like sending the specific code via SMS or
emails.

•Practice good password management - make your password not so easy to guess. Don’t give
birthdays or any number connected obviously to you.
5. Hacking Forensic Skills. It is the process of knowing the hacking attacks in the system. And
properly extracting evidences to report the crime.

6. What are the OSI Layer, keywords, devices?

Physical - bits/bitstream - cables, hab

Data Link. -frames. - switch , MAC

Network. -packets. -router, IP Address

Transport. -segments. -firewall

Session

Presentation Data. NGFW

Application

Das könnte Ihnen auch gefallen