Description
Declare and demonstrate the use of an iterator (in the foward direction) that would print all of the strings in a vector of strings to the screen. Each string should appear on a line by itself followed by a new line character. You may assume that the vector, called words, has already been created and filled with data.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
here is the solution i have test it with visual studioalso i have include example of vector word filled with data
#include
#...
Completion Status:
100%
Review
Review
Anonymous
Great! 10/10 would recommend using Studypool to help you study.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
CMIT 391 UMCP Proposal for Faster Computing in Linux Company PPT
Faster
Computing has contacted Go2Linux and requested a brief proposal presentation
for migrating its systems from Windo ...
CMIT 391 UMCP Proposal for Faster Computing in Linux Company PPT
Faster
Computing has contacted Go2Linux and requested a brief proposal presentation
for migrating its systems from Windows to Linux.
SC 669 Boston University Procedural SQL Lab 4 Assignment
The objective of this lab is to teach you how to develop and use basic stored procedures and triggers the procedural langu ...
SC 669 Boston University Procedural SQL Lab 4 Assignment
The objective of this lab is to teach you how to develop and use basic stored procedures and triggers the procedural language of your chosen DBMS.
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverabl ...
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverable.Part 1: Review QuestionsBefore diving into a lab exercise, complete the following review questions:Security Control TypesThe concept of defense in depth can be broken down into three different security control types. Identify the security control type of each set of defense tactics.Walls, bollards, fences, guard dogs, cameras, and lighting are what type of security control?Security awareness programs, BYOD policies, and ethical hiring practices are what type of security control?Encryption, biometric fingerprint readers, firewalls, endpoint security, and intrusion detection systems are what type of security control?Intrusion Detection and Attack indicatorsWhat's the difference between an IDS and an IPS?What's the difference between an Indicator of Attack and an Indicator of Compromise?The Cyber Kill ChainName each of the seven stages for the Cyber Kill chain and provide a brief example of each.Stage 1:Stage 2:Stage 3:Stage 4:Stage 5:Stage 6:Stage 7:Snort Rule AnalysisUse the provided Snort rules to answer the following questions:Snort Rule #1alert tcp $EXTERNAL_NET any -> $HOME_NET 5800:5820 (msg:"ET SCAN Potential VNC Scan 5800-5820"; flags:S,12; threshold: type both, track by_src, count 5, seconds 60; reference:url,doc.emergingthreats.net/2002910; classtype:attempted-recon; sid:2002910; rev:5; metadata:created_at 2010_07_30, updated_at 2010_07_30;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #2alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET POLICY PE EXE or DLL Windows file download HTTP"; flow:established,to_client; flowbits:isnotset,ET.http.binary; flowbits:isnotset,ET.INFO.WindowsUpdate; file_data; content:"MZ"; within:2; byte_jump:4,58,relative,little; content:"PE|00 00|"; distance:-64; within:4; flowbits:set,ET.http.binary; metadata: former_category POLICY; reference:url,doc.emergingthreats.net/bin/view/Main/2018959; classtype:policy-violation; sid:2018959; rev:4; metadata:created_at 2014_08_19, updated_at 2017_02_01;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #3Your turn! Write a Snort rule that alerts when traffic is detected inbound on port 4444 to the local network on any port. Be sure to include the msg in the Rule Option.Part 2: "Drop Zone" LabIn this lab exercise, you will assume the role of a Jr. Security Administrator at an indoor skydiving company called Drop Zone.Your company hosts a web server that takes online reservations and credit card payments. As a result, your company must comply with PCI/DSS regulations which requires businesses who take online credit card payments to have a firewall in place to protect personally identifiable information (PII).Your network has been under attack from the following three IPs: 10.208.56.23, 135.95.103.76, and 76.34.169.118. You have decided to add these IPs to the drop zone within your firewall.The first requirement of PCI/DSS regulations is to protect your system with firewalls. "Properly configured firewalls protect your card data environment. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by your organization." PCI DSS Quick Reference GuideSet Up:For this lab you will use the Network Security Lab located in Azure.Once logged in, launch an instance of the machine firewalld from the HyperV Manager and login with the following credentials:Username: sysadminPassword: cybersecurityReference: https://manpages.debian.org/testing/firewalld/firewall-cmd.1.en.htmlInstructions:The Senior Security Manager has drafted configuration requirements for your organization with the following specification.You need to configure zones that will segment each network according to service type.Public ZoneServices: HTTP, HTTPS, POP3, SMTPInterface: ETH0Web ZoneSource IP: 201.45.34.126Services: HTTPInterface: ETH1Sales ZoneSource IP: 201.45.15.48Services: HTTPSInterface: ETH2Mail ZoneSource IP: 201.45.105.12Services: SMTP, POP3Interface: ETH3You also need to drop all traffic from the following blacklisted IPs:10.208.56.23135.95.103.7676.34.169.118Uninstall ufwBefore getting started, you should verify that you do not have any instances of ufw running. This will avoid conflicts with your firewalld service. This also ensures that firewalld will be your default firewall.Run the command that removes any running instance of ufw.Enable and start firewalldBy default, the firewalld service should be running. If not, then run the following commands:Run the commands that enable and start firewalld upon boots and reboots.Note: This will ensure that firewalld remains active after each reboot.Confirm that the service is running.Run the command that checks whether or not the firewalld service is up and running.List all firewall rules currently configured.Next, lists all currently configured firewall rules. This will give you a good idea of what's currently configured and save you time in the long run by not doing double work.Run the command that lists all currently configured firewall rules:Take note of what zones and settings are configured. You many need to remove unneeded services and settings.List all supported service types that can be enabled.Run the command that lists all currently supported services to see if the service you need is availableWe can see that the Home and Drop Zones are created by default.Zone ViewsRun the command that lists all currently configured zones.We can see that the Public and Drop Zones are created by default. Therefore, we will need to create Zones for Web, Sales, and Mail.Create Zones for Web, Sales and Mail. (Hint look at the manpage in the instructions)Run the commands that create Web, Sales and Mail zones.Use the manpage link provided above for assistance.Set the zones to their designated interfaces.Run the command that sets your interface to your zones.Use the configurations provided at the beginning of the instructions.Add services to the active zones.Run the commands that add services to the public zone, the web zone, the sales zone, and the mail zone.Use the configurations provided at the beginning of the instructions.Add your adversaries to the Drop Zone.Run the command that will add all the blacklisted IPs to the Drop Zone.Make rules permanent then reload them:It's good practice to ensure that your firewalld installation remains nailed up and retains its services across reboots. This ensure that the network remains secured after unplanned outages such as power failures.Run the command that reloads the firewalld configurations and writes it to memory.View active ZonesNow, we'll want to provide truncated listings of all currently active zones. This a good time to verify your zone settings.Run the command that displays all zone services.Block an IP addressUse a rich-rule that blocks the IP address 138.138.0.3 on your public zone.Block Ping/ICMP RequestsHarden your network against ping scans by blocking icmp ehco replies.Run the command that blocks pings and icmp requests in your public zone.Rule CheckNow that you've set up your brand new firewalld installation, it's time to verify that all of the settings have taken effect.Run the command that lists all of the rule settings. Run one command at a time for each zone.Are all of the rules in place? If not, then go back and make the necessary modification before checking again.Congratulations! You have successfully configured and deployed a fully comprehensive firewalld installation.Part 3: IDS, IPS, DiD, and FirewallsAnswer the following review questions.IDS vs. IPS SystemsName and define two ways an IDS connects to a network.Describe how an IPS connects to a network.What type of IDS compares patterns of traffic to predefined signatures and is unable to detect Zero-Day attacks?Which type of IDS is beneficial for detecting all suspicious traffic that deviates from the well-known baseline and is excellent at detecting when an attacker probes or sweeps a network?Defense in DepthFor each of the following scenarios, provide the layer of Defense in Depth that applies:A criminal hacker tailgates an employee through an exterior door into a secured facility, explaining that they forgot their badge at home.A zero-day goes undetected by antivirus software.A criminal successfully gains access to HR’s database.A criminal hacker exploits a vulnerability within an operating system.A hacktivist organization successfully performs a DDoS attack, taking down a government website.Data is classified at the wrong classification level.A state sponsored hacker group successfully firewalked an organization to produce a list of active services on an email server.Name one method of protecting data-at-rest from being readable on hard drive.Name one method to protect data-in-transit.What technology could provide law enforcement with the ability to track and recover a stolen laptop.How could you prevent an attacker from booting a stolen laptop using an external hard drive?Firewall Architectures and MethodologiesWhich type of firewall verifies the three-way TCP handshake? TCP handshake checks are designed to ensure that session packets are from legitimate sources.Which type of firewall considers the connection as a whole? Meaning, instead of looking at only individual packets, these firewalls look at whole streams of packets at one time.Which type of firewall intercepts all traffic prior to being forwarded to its final destination. In a sense, these firewalls act on behalf of the recipient by ensuring the traffic is safe prior to forwarding it?Which type of firewall examines data within a packet as it progresses through a network interface by examining source and destination IP address, port number, and packet type- all without opening the packet to inspect its contents?Which type of firewall filters based solely on source and destination MAC address?Bonus Lab: "Green Eggs & SPAM"This bonus activity is a culmination of the topics and tools covered during the following Unit 11 activities:Alert - FTP File ExtractionAlert - ET INFO Executable DownloadAlert - C2 BeaconInvestigation, Analysis, and Escalation ActivityThreat Hunting - Cyber Threat IntelligenceIn this activity, you will target spam, uncover its whereabouts, and attempt to discover the intent of the attacker.You will assume the role of a Jr. Security administrator working for the Department of Technology for the State of California.As a junior administrator, your primary role is to perform the initial triage of alert data: the initial investigation and analysis followed by an escalation of high priority alerts to senior incident handlers for further review.You will work as part of a Computer and Incident Response Team (CIRT), responsible for compiling Threat Intelligence as part of your incident report.InstructionsLog into the Security Onion VM and use the following Indicator of Attack to complete this portion of the homework.Locate the following Indicator of Attack in Sguil:Source IP/Port: 188.124.9.56:80Destination Address/Port: 192.168.3.35:1035Event Message: ET TROJAN JS/Nemucod.M.gen downloading EXE payloadAnswer the following questions:What was the indicator of an attack?Hint: What do the details of the reveal?What was the attacker's motivation?Describe observations and indicators that may be related to the perpetrators of the intrusion. Categorize your insights according to the appropriate stage of the cyber kill chain, as structured in the following table.TTPExampleFindingsReconnaissanceHow did they attacker locate the victim?WeaponizationWhat was it that was downloaded?DeliveryHow was it downloaded?ExploitationWhat does the exploit do?InstallationHow is the exploit installed?Command & Control (C2)How does the attacker gain control of the remote machine?Actions on ObjectivesWhat does the software that the attacker sent do to complete it's tasks?What are your recommended mitigation strategies?Cite your references here.
Similar Content
Programming Worksheet
1 Check it out!
Whenever you buy something from the grocery store, the person at the checkout counter
scans the code at th...
Java Question help Multiplication
public class Multiplication {
public static void main (String[] args) {
final int FIRST_MAX = 5;
fi...
Everest College Social Marketing Processes & Business Models Discussion
Today, social, mobile, and local marketing are the fastest-growing forms of online marketing. The assignment this week is ...
need help writing function in R
Ji`Bt 6Q`KmHiBQM 7Q JmHiBTH2 GBM2` _2;`2bbBQM
6Q` KQ`2 i?M QM2 T`2/B+iQ`- r2 M22/ iQ mb2 bHB;?iHv /Bz2`2Mi MQiiBQM 7Q...
UML activig
Choose a UML diagram that another student wrote by replying and writing the code to implement their class. Write the...
A 1,400-1,750-word paper which conduct a political, legal, cultural, financial,ethical risk analysis
Please Note: This is a continuation of the assignment attached. It is for a global business venture, not domestic. Do not...
C Questions
cout...
Sqlmap For Automated Sql Injection And Database Takeover
Databases are essential components that ought to preserve the integrity, confidentiality and availability of the data. In ...
S137 Unshielded Twisted Pair
Unshielded Twisted Pair (UTP), Coaxial, And Single Mode Fiber Optic UNSHIELDED TWISTED PAIR (UTP), COAXIAL, AND SINGLE MO...
Related Tags
Book Guides
Death on the Nile
by Agatha Christie
The English Patient
by Michael Ondaatje
The Nightingale
by Kristin Hannah
To Kill a Mockingbird
by Harper Lee
Tess of the DUrbervilles
by Thomas Hardy
The Knife of Never Letting Go
by Patrick Ness
A Passage to India
by E. M. Forster
The Book Thief
by Markus Zusak
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
CMIT 391 UMCP Proposal for Faster Computing in Linux Company PPT
Faster
Computing has contacted Go2Linux and requested a brief proposal presentation
for migrating its systems from Windo ...
CMIT 391 UMCP Proposal for Faster Computing in Linux Company PPT
Faster
Computing has contacted Go2Linux and requested a brief proposal presentation
for migrating its systems from Windows to Linux.
SC 669 Boston University Procedural SQL Lab 4 Assignment
The objective of this lab is to teach you how to develop and use basic stored procedures and triggers the procedural langu ...
SC 669 Boston University Procedural SQL Lab 4 Assignment
The objective of this lab is to teach you how to develop and use basic stored procedures and triggers the procedural language of your chosen DBMS.
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverabl ...
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverable.Part 1: Review QuestionsBefore diving into a lab exercise, complete the following review questions:Security Control TypesThe concept of defense in depth can be broken down into three different security control types. Identify the security control type of each set of defense tactics.Walls, bollards, fences, guard dogs, cameras, and lighting are what type of security control?Security awareness programs, BYOD policies, and ethical hiring practices are what type of security control?Encryption, biometric fingerprint readers, firewalls, endpoint security, and intrusion detection systems are what type of security control?Intrusion Detection and Attack indicatorsWhat's the difference between an IDS and an IPS?What's the difference between an Indicator of Attack and an Indicator of Compromise?The Cyber Kill ChainName each of the seven stages for the Cyber Kill chain and provide a brief example of each.Stage 1:Stage 2:Stage 3:Stage 4:Stage 5:Stage 6:Stage 7:Snort Rule AnalysisUse the provided Snort rules to answer the following questions:Snort Rule #1alert tcp $EXTERNAL_NET any -> $HOME_NET 5800:5820 (msg:"ET SCAN Potential VNC Scan 5800-5820"; flags:S,12; threshold: type both, track by_src, count 5, seconds 60; reference:url,doc.emergingthreats.net/2002910; classtype:attempted-recon; sid:2002910; rev:5; metadata:created_at 2010_07_30, updated_at 2010_07_30;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #2alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET POLICY PE EXE or DLL Windows file download HTTP"; flow:established,to_client; flowbits:isnotset,ET.http.binary; flowbits:isnotset,ET.INFO.WindowsUpdate; file_data; content:"MZ"; within:2; byte_jump:4,58,relative,little; content:"PE|00 00|"; distance:-64; within:4; flowbits:set,ET.http.binary; metadata: former_category POLICY; reference:url,doc.emergingthreats.net/bin/view/Main/2018959; classtype:policy-violation; sid:2018959; rev:4; metadata:created_at 2014_08_19, updated_at 2017_02_01;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #3Your turn! Write a Snort rule that alerts when traffic is detected inbound on port 4444 to the local network on any port. Be sure to include the msg in the Rule Option.Part 2: "Drop Zone" LabIn this lab exercise, you will assume the role of a Jr. Security Administrator at an indoor skydiving company called Drop Zone.Your company hosts a web server that takes online reservations and credit card payments. As a result, your company must comply with PCI/DSS regulations which requires businesses who take online credit card payments to have a firewall in place to protect personally identifiable information (PII).Your network has been under attack from the following three IPs: 10.208.56.23, 135.95.103.76, and 76.34.169.118. You have decided to add these IPs to the drop zone within your firewall.The first requirement of PCI/DSS regulations is to protect your system with firewalls. "Properly configured firewalls protect your card data environment. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by your organization." PCI DSS Quick Reference GuideSet Up:For this lab you will use the Network Security Lab located in Azure.Once logged in, launch an instance of the machine firewalld from the HyperV Manager and login with the following credentials:Username: sysadminPassword: cybersecurityReference: https://manpages.debian.org/testing/firewalld/firewall-cmd.1.en.htmlInstructions:The Senior Security Manager has drafted configuration requirements for your organization with the following specification.You need to configure zones that will segment each network according to service type.Public ZoneServices: HTTP, HTTPS, POP3, SMTPInterface: ETH0Web ZoneSource IP: 201.45.34.126Services: HTTPInterface: ETH1Sales ZoneSource IP: 201.45.15.48Services: HTTPSInterface: ETH2Mail ZoneSource IP: 201.45.105.12Services: SMTP, POP3Interface: ETH3You also need to drop all traffic from the following blacklisted IPs:10.208.56.23135.95.103.7676.34.169.118Uninstall ufwBefore getting started, you should verify that you do not have any instances of ufw running. This will avoid conflicts with your firewalld service. This also ensures that firewalld will be your default firewall.Run the command that removes any running instance of ufw.Enable and start firewalldBy default, the firewalld service should be running. If not, then run the following commands:Run the commands that enable and start firewalld upon boots and reboots.Note: This will ensure that firewalld remains active after each reboot.Confirm that the service is running.Run the command that checks whether or not the firewalld service is up and running.List all firewall rules currently configured.Next, lists all currently configured firewall rules. This will give you a good idea of what's currently configured and save you time in the long run by not doing double work.Run the command that lists all currently configured firewall rules:Take note of what zones and settings are configured. You many need to remove unneeded services and settings.List all supported service types that can be enabled.Run the command that lists all currently supported services to see if the service you need is availableWe can see that the Home and Drop Zones are created by default.Zone ViewsRun the command that lists all currently configured zones.We can see that the Public and Drop Zones are created by default. Therefore, we will need to create Zones for Web, Sales, and Mail.Create Zones for Web, Sales and Mail. (Hint look at the manpage in the instructions)Run the commands that create Web, Sales and Mail zones.Use the manpage link provided above for assistance.Set the zones to their designated interfaces.Run the command that sets your interface to your zones.Use the configurations provided at the beginning of the instructions.Add services to the active zones.Run the commands that add services to the public zone, the web zone, the sales zone, and the mail zone.Use the configurations provided at the beginning of the instructions.Add your adversaries to the Drop Zone.Run the command that will add all the blacklisted IPs to the Drop Zone.Make rules permanent then reload them:It's good practice to ensure that your firewalld installation remains nailed up and retains its services across reboots. This ensure that the network remains secured after unplanned outages such as power failures.Run the command that reloads the firewalld configurations and writes it to memory.View active ZonesNow, we'll want to provide truncated listings of all currently active zones. This a good time to verify your zone settings.Run the command that displays all zone services.Block an IP addressUse a rich-rule that blocks the IP address 138.138.0.3 on your public zone.Block Ping/ICMP RequestsHarden your network against ping scans by blocking icmp ehco replies.Run the command that blocks pings and icmp requests in your public zone.Rule CheckNow that you've set up your brand new firewalld installation, it's time to verify that all of the settings have taken effect.Run the command that lists all of the rule settings. Run one command at a time for each zone.Are all of the rules in place? If not, then go back and make the necessary modification before checking again.Congratulations! You have successfully configured and deployed a fully comprehensive firewalld installation.Part 3: IDS, IPS, DiD, and FirewallsAnswer the following review questions.IDS vs. IPS SystemsName and define two ways an IDS connects to a network.Describe how an IPS connects to a network.What type of IDS compares patterns of traffic to predefined signatures and is unable to detect Zero-Day attacks?Which type of IDS is beneficial for detecting all suspicious traffic that deviates from the well-known baseline and is excellent at detecting when an attacker probes or sweeps a network?Defense in DepthFor each of the following scenarios, provide the layer of Defense in Depth that applies:A criminal hacker tailgates an employee through an exterior door into a secured facility, explaining that they forgot their badge at home.A zero-day goes undetected by antivirus software.A criminal successfully gains access to HR’s database.A criminal hacker exploits a vulnerability within an operating system.A hacktivist organization successfully performs a DDoS attack, taking down a government website.Data is classified at the wrong classification level.A state sponsored hacker group successfully firewalked an organization to produce a list of active services on an email server.Name one method of protecting data-at-rest from being readable on hard drive.Name one method to protect data-in-transit.What technology could provide law enforcement with the ability to track and recover a stolen laptop.How could you prevent an attacker from booting a stolen laptop using an external hard drive?Firewall Architectures and MethodologiesWhich type of firewall verifies the three-way TCP handshake? TCP handshake checks are designed to ensure that session packets are from legitimate sources.Which type of firewall considers the connection as a whole? Meaning, instead of looking at only individual packets, these firewalls look at whole streams of packets at one time.Which type of firewall intercepts all traffic prior to being forwarded to its final destination. In a sense, these firewalls act on behalf of the recipient by ensuring the traffic is safe prior to forwarding it?Which type of firewall examines data within a packet as it progresses through a network interface by examining source and destination IP address, port number, and packet type- all without opening the packet to inspect its contents?Which type of firewall filters based solely on source and destination MAC address?Bonus Lab: "Green Eggs & SPAM"This bonus activity is a culmination of the topics and tools covered during the following Unit 11 activities:Alert - FTP File ExtractionAlert - ET INFO Executable DownloadAlert - C2 BeaconInvestigation, Analysis, and Escalation ActivityThreat Hunting - Cyber Threat IntelligenceIn this activity, you will target spam, uncover its whereabouts, and attempt to discover the intent of the attacker.You will assume the role of a Jr. Security administrator working for the Department of Technology for the State of California.As a junior administrator, your primary role is to perform the initial triage of alert data: the initial investigation and analysis followed by an escalation of high priority alerts to senior incident handlers for further review.You will work as part of a Computer and Incident Response Team (CIRT), responsible for compiling Threat Intelligence as part of your incident report.InstructionsLog into the Security Onion VM and use the following Indicator of Attack to complete this portion of the homework.Locate the following Indicator of Attack in Sguil:Source IP/Port: 188.124.9.56:80Destination Address/Port: 192.168.3.35:1035Event Message: ET TROJAN JS/Nemucod.M.gen downloading EXE payloadAnswer the following questions:What was the indicator of an attack?Hint: What do the details of the reveal?What was the attacker's motivation?Describe observations and indicators that may be related to the perpetrators of the intrusion. Categorize your insights according to the appropriate stage of the cyber kill chain, as structured in the following table.TTPExampleFindingsReconnaissanceHow did they attacker locate the victim?WeaponizationWhat was it that was downloaded?DeliveryHow was it downloaded?ExploitationWhat does the exploit do?InstallationHow is the exploit installed?Command & Control (C2)How does the attacker gain control of the remote machine?Actions on ObjectivesWhat does the software that the attacker sent do to complete it's tasks?What are your recommended mitigation strategies?Cite your references here.
Earn money selling
your Study Documents