Task- 2:
Compare the QUALYS and NESSUS output results of above mentioned websites and select the website(s) which you found more secure.
Task- 3:
Perform a security analysis of Google chrome browser by using “Qualys BrowserCheck” feature.
Take the screenshots of all the tasks.
Note: Your own name (TALHA AFZAL) must be shown on QUALYS and NESSUS Main screens after login and QUALYS BrowserCheck must show the date for the month of June 2021.
Different kinds of tools are available for vulnerability management i.e. QUALYS and NESSUS. You are required to download the QUALYS and NESSUS trial versions and install these tools on your PC/Laptop. You can also use cloud versions if you feel any difficulty in downloading of QUALYS or NESSUS. For this, you may visit the following links:
https://www.qualys.com/community-edition/
https://www.qualys.com/cloud-platform/
https://www.tenable.com/products/nessus/nessus-professional/evaluate
After downloading above softwares, perform following tasks.
Task- 1:
Run the scanner of above mentioned tools and scan following websites:
https://pucit.edu.pk/
https://nust.edu.pk/
https://lums.edu.pk/
https://www.mit.edu/
Task 2 and 3 are in the next Question Because the length of the question exceeds
Consider a computer system where physical address has 32 bits. Assume that 4kilobyte pages are defined. Assume also that each page table entry consumes 4 bytes. How much memory would be required to keep the entire page table (including page and frame information) (1 kilobyte = 1024 byte)
Consider a paging system where a program’s logical address space has 32 pages each 1024 words long and a physical memory of 2 mega words.
a. How many bits are there in the logical address?
b. How many bits are there in the physical address?
c. How many entries are there in the page table?
A system has three processes and three different types of resources. The current allocation and requests are as follows.
Process Allocated Request Available
A 1 1 2 a b c 0 1 0
B 2 0 1 d e f
C 1 1 0 g h i
Apply the deadlock detection algorithm to compute the maximum possible values of a, b, c, d, e, f, g, h and i so that the sequence is a safe sequence.
1. Suppose, an sequence of disk track numbers and initial head position are given below, Request sequence = {65, 79, 34, 60, 92, 48, 41, 88} Initial head position = 50 Apply C-SCAN and FIFO.
2. Consider a magnetic disk drive has 64 sectors per track. Sector size is 1 kB. The average seek time is 8 ms and the drive rotates at 3600 rpm. Estimate the time required to transfer a 5-MB file and average access time.
How ICT (Information and Communication Technology) can be used to overcome issues in education system of Pakistan? Write any 4 issues and how ICT can help to overcome these.
Given a file containing various text, develop a program that will do the following using flex:
1. Read input from file and write output to file.
2. Count the number of vowel and consonant in the file and print the count.
3. Count a number of floating point numbers and integer numbers and print the count.
4. Count total number of white spaces.
5. Count total number of lines in the file.
which step of sdlc performs cost/benefit analysis?
a. feasibility study
b. analysis
c. design
d. none of the following options
C208
In your line of work (if you are a worker or employed or self-employed) or in your line of schooling (if you are only a student and not working as well), discuss an example remote control connection that could be useful to you in this era of COVID-19.