Which ports should be filtered out to protect a network from smb attacks?

Answers

Answer 1

Through defend against SMB attacks, a network should filter out ports 137 to 139 and 445. Network file sharing has always been possible with SMB.

What is the best way to guard against NetBIOS attacks?

You can stop the NetBIOS service from being misused in addition to turning it off by blocking TCP & UDP port 137 in your Windows firewall.

When a user enters privileged mode on a Cisco router, which prompt appears?

From User Exec Mode, we input the "Enable" command to enter Privileged Mode. If enabled, you will be prompted for a password by the router. Once we are in Privileged Mode, you will note that the prompt switches from ">" to a "#" to let you know that we are there.

To know more about SMB visit :-

https://brainly.com/question/14839707

#SPJ4


Related Questions

What is the before-tax cost of debt of a company with $1,500,000 of interest expense, $25 million of total debt, and 15% of a marginal tax rate?
a. 5.55% b. 5.1% c. 4.25%
d. 6.0%

Answers

Where the above conditions are given, the before-tax cost of debt is 0.06 or 6%

How is this so?

To calculate the before-tax cost of debt, we can use the formula

Before-tax cost of debt = Interest expense / Total debt

Plugging in the given values  -

Before-tax cost of debt = $1,500,000 / $25,000,000

Before-tax cost of debt = 0.06 or 6%

Therefore, the correct answer is option d. 6.0%.

Learn more about before-tax cos at:

https://brainly.com/question/29332946

#SPJ4

which componet is the smallest unit in a spreadsheet

Answers

The cell is the smallest unit in a spreadsheet

What is it called when servers on the Internet supply applications as a service, rather than a product

Answers

Answer:

cloud computing

From the article Social Media: Employability skills for the 21st Century, reflect on the author’s position that "Social Business is a Business Essential".

For Task 3 write an ‘e-mail formatted’ post back to the author about whether you agree or disagree with their position on social business and why. Be sure to reflect on your own experience to make your position more credible.

Start your email with a greeting, apply a pattern, and end with a sign-off and signature.

Answers

It depends on the specific context and goals of the business, as social media can be beneficial for some organizations but not necessarily essential for all.

Do you agree with the author's position that social business is a business essential, and why?

Subject: Re: Your Article on Social Media: Employability Skills for the 21st Century

Dear [Author's Name],

I hope this email finds you well. I recently read your article titled "Social Media: Employability Skills for the 21st Century" and wanted to share my thoughts on your position regarding the importance of social business.

Firstly, I must say that I thoroughly enjoyed your article and found your insights to be thought-provoking. You made a compelling case for social business being a business essential in today's digital landscape. However, I must respectfully disagree with your perspective based on my own experiences.

While I acknowledge the significant role of social media and its impact on communication, collaboration, and networking, I believe that the importance of social business may vary depending on the industry and specific job roles. While it is true that many businesses have embraced social media platforms for marketing, customer engagement, and brand building, not all industries or job functions benefit equally from a strong social media presence.

In my personal experience, I have worked in industries where social media played a minimal role in day-to-day operations and the overall success of the business. Instead, other factors such as technical skills, industry expertise, and problem-solving abilities were prioritized. Therefore, I would argue that while social business may be valuable in certain contexts, it may not be an essential skill for all professionals.

That being said, I do recognize the potential benefits of social business, especially in terms of personal branding, networking, and staying updated with industry trends. It can certainly enhance one's employability and open doors to new opportunities. However, I believe that the level of importance placed on social business should be assessed on a case-by-case basis, considering the specific industry, job requirements, and individual career goals.

Learn more about social media

brainly.com/question/30194441

#SPJ11

question in the attached img. pls help me thank you in advance ​

question in the attached img. pls help me thank you in advance

Answers

Answer:here you go miss

Explanation:

1.A title bar is a graphical user interface (GUI) component of a software application or Web page.

2. A menu bar is a row or strip of menu items titles that, when clicked, display dropdown menu of other items or commands.

3. The toolbar, also called bar or standard toolbar, is a row of buttons, often near the top of an application window, that controls software functions.

4. Apache Axis (A pache e X tensible I nteraction S ystem) is an open-source, XML based Web service framework.

5. A status bar is located at the bottom of Internet browser windows and many application windows and displays the current state of the web page or application being displayed.

6. VCB box Type in value and press Enter to apply the

value to the active tool (no click required).

2.
Select the correct answer.
Cable television systems originated with the invention of a particular component. What was this component called?
OA. coaxial cable
OB. analog transmission
OC. digital transmission
D. community antenna
Reset
Next.

Answers

Answer:

I believe it is Coaxial Cable. I looked it up.

Explanation:

in the file singlylinkedlist.h add a new method called deletenode() that will delete a node with value specified.

Answers

To add the `deleteNode()` method, modify the `singlylinkedlist.h` file by including a public method named `deleteNode()` that traverses the linked list, finds the node with the specified value, and removes it by updating the appropriate pointers.

How can a new method called `deleteNode()` be added to the `singlylinkedlist.h` file to delete a node with a specified value?

To add a new method called `deleteNode()` in the file `singlylinkedlist.h` that deletes a node with a specified value, you can follow these steps:

1. Open the `singlylinkedlist.h` file in a text editor or an Integrated Development Environment (IDE).

2. Locate the class definition for the singly linked list. It should include member variables and methods for the linked list implementation.

3. Inside the class definition, add a new public method called `deleteNode()` with the appropriate function signature. For example, the method signature could be `void deleteNode(int value)`, where `value` is the value of the node to be deleted.

4. Implement the `deleteNode()` method by traversing the linked list and finding the node with the specified value. Once the node is found, update the pointers to remove it from the list.

5. Save the changes made to the `singlylinkedlist.h` file.

Here's an example of how the method signature and implementation might look:

   void deleteNode(int value) {

       Node ˣ current = head;

       Node ˣ  previous = nullptr;

       while (current != nullptr) {

           if (current->data == value) {

               if (previous == nullptr) {

                   // Deleting the head node

                   head = current->next;

               } else {

                   previous->next = current->next;

               }

               delete current;

               return;

           }

           previous = current;

           current = current->next;

       }

   }

```

This explanation assumes that the `singlylinkedlist.h` file already contains the necessary class and function declarations for a singly linked list implementation.

Learn more about method

brainly.com/question/31251705

#SPJ11

Write a program to calculate the volume of a cube which contains 27 number of small identical cubes on the basis of the length of small cube input by a user.​

Answers

Answer:

This program is written in python programming language.

The program is self explanatory; hence, no comments was used; However, see explanation section for line by line explanation.

Program starts here

length = float(input("Length of small cube: "))

volume = 27 * length**3

print("Volume: "+(str(volume)))

Explanation:

The first line of the program prompts the user for the length of the small cube;

length = float(input("Length of small cube: "))

The volume of the 27 identical cubes is calculated on the next line;

volume = 27 * length**3

Lastly, the calculated volume of the 27 cubes is printed

print("Volume: "+(str(volume)))

How can Noor get a balance between allowing some information to be public and keeping some information private and secure?

helpp

Answers

Hey there :)

In order to get a balance between some information to be public and keeping some information private and secure, Noor has two options :-

¤ Noor can store his public informations in one account and private informations in banks or make another separate account.

¤ Noor can try to not say any of his private informations to others.

¤ Noor can store his private informations in computers or hard-drive with secure passwords.

\(Benjemin360\)

The bakery has requested the following custom variables:

-customer’s first name
-customer’s last name
-a coupon percentage off
-the date that they became a newsletter subscriber

Create an appropriate variable for each of these four items.

Then create string for the custom newsletter text that will show up before, between, and after each custom variable.

For example, “Hello,” might be the first string, followed by the variable carrying the customer’s name, followed by “Thanks for subscribing to our newsletter!” Your custom newsletter text should greet the person, then offer them a coupon, and then thank them for being a loyal customer.

Add placeholder names and information to populate into the variables for testing purposes by making up data for each. You can use your own name, for example, as this is simply a prototype or proof of concept. To do this, remember that the equals sign = between a variable and its value assigns that value to the variable.

Finally, use the print function to display the final newsletter text that includes all the required variables. This will display a final string that reads like a plaintext newsletter with the variables appropriately replaced by the defaults for each that you set in Step 1.

We can also combine two strings together in a single print function by using the + sign like this:

print(greetingTxt + firstName + bodyTxt1)

Answers

Code:

firstName = "Bill"

lastName = "Nye"

coupon = 15

joinDate = "January 14, 1973"

print("Hello, " + firstName + lastName)

print("Thanks for subscribing to our newsletter!")

print("Here's a coupon for " + str(coupon) + "% off for being subscribed since " + joinDate)

Output:

Hello, BillNye

Thanks for subscribing to our newsletter!

Here's a coupon for 15% off for being subscribed since January 14, 1973


Write a BASIC PROGRAM to calculate the area of
a triangle whose sides are a, b and c. Area=s(s-a)
(s-b) (s-c), where s = 1/2 (a+b+c)​

Answers

Answer: Do with excel

Explanation:

Which career would be most likely to work directly with end-users?

Answers

Answer:

help desk specialist

Explanation:

Help desk specialists work directly with end users to support them.

Answer:

help desk specialist

To prevent computer errors, which of the following characters should not be used in a filename?


– (hyphen)

_ (underscore)

% (percent

* (asterisk)

Answers

Answer:

asterisk

Explanation:

it cannot be used because it is a

Answer:

* asterisk and % percent

Explanation:

Edge Nuity

You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm sure you thought it was funny back when you came up with that password (chEEzburg3rz). Write a program that tells you whether your guess is correct. If it is correct, it should grant access like this: Enter password: chEEzburg3rz Access granted....
If your guess is incorrect it should deny access like this:
Enter password: lolcatZ
Access denied

Answers

Answer:

The program written in Python is as follows (See Explanation Section for detailed explanation)

password = "chEEzburg3rz"

userpassword = input("Enter Password: ")

if userpassword == password:

     print("Access granted....")

else:

     print("Access Denied")

Explanation:

The programming language was not stated; However, I answered your question using Python

The line initializes the password to chEEzburg3rz"

password = "chEEzburg3rz"

This line prompts user for input

userpassword = input("Enter Password: ")

This if condition checks if user input corresponds with the initialized password

if userpassword == password:

     print("Access granted....")  If yes, this line is executed

else:

     print("Access Denied")  If otherwise, this line is executed

Which of these jobs would be most appropriate for someone who majors in information technology? managing a database for a large department store developing new computing technology that will someday improve network speeds managing the computer network for a large department store designing the hardware for a military helicopter's on-board computer

Answers

Answer:

A

Explanation:

managing the computer network for a large department store

The job that would be most appropriate for someone who majors in information technology is to manage the computer network for a large department store. Thus, the correct option for this question is C.

What is Information technology?

Information technology may be defined as a broad study of a system and network that uses the computer's hardware, software, services, and supporting infrastructure in order to manage and deliver information using voice, data, and video.

So, the job associated with information technology may require the significant utilization of computers and networks over a huge range of numbers. Managing a database is the work of software engineers, designing the hardware for a military helicopter's onboard computer is the work of hardware engineers, etc.

Therefore, the job that would be most appropriate for someone who majors in information technology is to manage the computer network for a large department store. Thus, the correct option for this question is C.

To learn more about Information technology, refer to the link:

https://brainly.com/question/4903788

#SPJ5

Which of the following is not a main method for sending information from one computer to
another?
Electricity
Light
Molecules
Radio

Answers

Molecules are not the main method for sending information from one computer to another. Thus, option C is correct.

There are the multiple method of sending information that using the radio waves most commonly used now a days. A Wireless method of sending information using radio waves.

A wireless router has receives the signal as well as decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. and sending information through radio waves involve two devices .One is receiver device and other is sending device.

Therefore, Molecules are not the main method for sending information from one computer to another. Thus, option C is correct.

Learn more about radio on:

https://brainly.com/question/29787337

#SPJ1

Are robots that fix other robots engineers or doctors.

Answers

The robots are Engineers

What best describes pattern-matching speech recognition

Answers

Answer:

Pattern matching in computer science is the checking and locating of specific sequences of data of some pattern among raw data or a sequence of tokens.

Pattern matching, in its classical form, involves the use of one-dimensional string matching. Patterns are either tree structures or sequences. There are different classes of programming languages and machines which make use of pattern matching. In the case of machines, the major classifications include deterministic finite state automata, deterministic pushdown automata, nondeterministic pushdown automata and Turing machines. Regular programming languages make use of regular expressions for pattern matching. Tree patterns are also used in certain programming languages like Haskell as a tool to process data based on the structure. Compared to regular expressions, tree patterns lack simplicity and efficiency.

What ethical issues might an audio engineer face?

Answers

If the track there working on is to quit and needs to turn it up. Or if there equipment stops working and can’t hear anything.

in ntfs, a deleted compressed file is hard to recover because it is encrypted. it uses multiple sectors. it requires microsoft's secret compression algorithm. it may be using multiple compression algorithms.

Answers

In NTFS (New Technology File System), a deleted compressed file is difficult to recover due to encryption, utilization of multiple sectors, and the involvement of Microsoft's secret compression algorithm. It may also employ multiple compression algorithms.

In NTFS, when a compressed file is deleted, it becomes challenging to recover due to several factors:

1. Encryption: Deleted compressed files in NTFS are typically encrypted, adding an additional layer of security. Encryption makes it difficult to retrieve the file's original content without the encryption key. .2. Multiple sectors: Compressed files are often stored in multiple sectors, making the recovery process more complex. The file's data is fragmented across different sectors, requiring a thorough and accurate reassembly process. 3. Microsoft's secret compression algorithm: NTFS utilizes a proprietary compression algorithm developed by Microsoft. The specifics of this algorithm are not publicly disclosed, making it challenging for third-party recovery tools to reconstruct the compressed file accurately 4. Multiple compression algorithms: NTFS supports the use of multiple compression algorithms. If a compressed file employs different compression algorithms, the recovery process becomes even more intricate, as each algorithm may require specific decompression techniques.  

Learn more about NTFS  here:

https://brainly.com/question/30735036

#SPJ11

-------------------- is using the published writings,
data, interpretations, or ideas of another without proper
documentation.
Lying
Cheating
Plagiarism
information

Answers

Answer:

Plagiarism

Explanation:

6. What type of application is designed for making slide shows?​

Answers

Keynotes is good , PowerPoint

Explanation:

Microsoft PowerPoint is one of the most popular presentation software package available. and it does do a very good job however, PowerPoint is not the only professional PowerPoint tool is there is 2019. there are many PowerPoint alternative available if you need to make a presentation.

Match the item on the left to the process or technique on the right to which it is most closely related. 1) baseline 2) traceable 3) librarian 4) revision A. chief programmer team B. user stories C. version control D. unit test E. requirements F. software configuration management G. agile development H. refactoring

Answers

The items on the left with the corresponding processes or techniques on the right are

1) Baseline - F. Software configuration management

2) Traceable - E. Requirements

3) Librarian - G. Agile development

4) Revision - C. Version control

Match the items on the left with the corresponding processes or techniques on the right: 1) baseline, 2) traceable, 3) librarian, 4) revision.

In the given matching exercise, the items on the left are related to different processes or techniques commonly used in software development. Here is the mapping of the items:

1) Baseline - C. Version control: Baseline refers to a specific version or snapshot of a software project that is considered stable and serves as a reference point for future changes.

2) Traceable - F. Software configuration management: Traceability is the ability to track and link software artifacts, such as requirements, design documents, and test cases, throughout the development lifecycle.

3) Librarian - F. Software configuration management: A librarian refers to a person or tool responsible for managing and organizing software artifacts and ensuring their proper storage, retrieval, and version control.

4) Revision - C. Version control: A revision represents a specific alteration or update made to a software artifact, typically tracked and managed through version control systems.

The provided options B, D, E, G, and H do not directly correspond to the given items.

The mapping for the given items is: 1) C, 2) F, 3) F, 4) C.

Learn more about items

brainly.com/question/31383285

#SPJ11

a system uses simple/pure paging and tlb each memory access requires 100ns tlb access requires 5ns tlb hit rate is 90%. work out the actual speedup because of the tlb? speedup

Answers

Each process in the operating system will have its own page table, which will contain Page Table Entry (Memory Management Technique: Paging) (PTE).

What is Translation Lookaside Buffer (TLB) in Paging?The frame number (the address in main memory to which we want to refer) and a few other essential bits (such as the valid/invalid bit, dirty bit, protection bit, etc.) will be included in this PTE. This page table entry (PTE) will indicate where the actual page is located in main memory.The issue now is where to put the page table such that overall access time (or reference time) will be less.Fast main memory content access using a CPU-generated address (i.e., a logical or virtual address) presented a challenge at first. Since registers are high-speed memory, some people at first considered utilizing them to store page tables since access times would be shorter.The concept employed here is to store the page table entries in registers, so that when a request is created from the CPU (virtual address), it will be matched to the correct page number of the page table, which will then reveal where in the main memory the corresponding page is located.Everything appears to be in order, but the issue is that the register size is small (in practice, it can only hold a maximum of 0.5k to 1k page table entries) and the process size may be large, so the required page table will also likely be large (let's say this page table contains 1M entries). As a result, the registers might not be able to hold all of the PTEs of the page table. Therefore, this strategy is not workable.

The Complete Question is Page Table Entry.

To Learn more About Page Table Entry refer to:

https://brainly.com/question/15409133

#SPJ4

Need answer ASAP!!!!

Need answer ASAP!!!!

Answers

Hi,

I tried answering this. Lol. Look at the image.

Need answer ASAP!!!!

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

the following code computes the product of a and b. what is its runtime?

int product (int a, int b) { int sum =0; for (int i=0; i< b; i ) { sum = a; } return sum; }

Answers

Since neither loop depends on the other, the two loops are independent. Therefore, we may define the difficulty of the two stacked loops as the sum of the difficulties of the separate loops.

The inner loop in j is O(lgn) and the outer loop in I is O(n) in this scenario (log base 2 of n). The total time is therefore O. (nlgn). The term is derived from the separation between compile time and runtime in compiled languages, which also distinguishes between the computer operations involved in creating a program (compilation) and running it on the target machine (the run time). Consider the following for a n of 16 to understand why the inner loop is O(lgn): j | step# 1 | 1 2 | 2 4 | 3 8 | 4 16 | 5.

Learn more about loop here-

https://brainly.com/question/14390367

#SPJ4

Unlike bar codes and other systems, _____ devices do not have to be in contact with the scanner to be read.

Answers

Answer:

radio frequency identification

Explanation:

true or false - an organization can improve its security defenses without even having to go through a security assessment

Answers

True an organization can improve its security defences without even having to go through a security assessment.

What do security assessment  entail?

An information system's or organization's security needs are being met through testing or evaluating security measures to see how well they are being implemented, functioning as intended, and providing the desired results.

What does a security assessment serve?

Important security safeguards in applications are found, evaluated, and put into place by a security risk assessment. Additionally, it emphasizes avoiding application security flaws and vulnerabilities. An enterprise can see the management approach holistically—from the viewpoint of an attacker—by conducting a risk analysis.

To know more about  security assessment visit:

https://brainly.com/question/14784003

#SPJ4

Which of the following is a valid instantiation of Folder?
Folder a = new Folder;
Folder a=Folder ();
Folder a = new Folder ( 22, 11);
Folder a = new Folder ( 3.2, 4.8);

Answers

The valid instantiation of the Folder class depends on the definition and requirements of the Folder class itself. Since there is no specific information provided about the Folder class or its constructor, it is difficult to determine the exact valid instantiation.

However, based on the given options:

1. Folder a = new Folder;

This instantiation is not valid because it is missing parentheses after the class name, which is required for instantiating a class using the "new" keyword.

2. Folder a = Folder ();

This instantiation is not valid because it is missing the "new" keyword, which is necessary for creating a new instance of an object.

3. Folder a = new Folder(22, 11);

This instantiation is valid if the Folder class has a constructor that accepts two integer parameters. It creates a new instance of the Folder class and passes the values 22 and 11 as arguments to the constructor.

4. Folder a = new Folder(3.2, 4.8);

This instantiation is valid if the Folder class has a constructor that accepts two double parameters. It creates a new instance of the Folder class and passes the values 3.2 and 4.8 as arguments to the constructor.

Ultimately, the validity of the instantiations depends on the implementation of the Folder class and the availability of the corresponding constructors with the specified parameter types.

For more such questions on instantiation, click on:

https://brainly.com/question/30099412

#SPJ11

Other Questions
Solve the system of linear equations below.x - 3y = -3x + 3y = 9A. x = -12, y = 7B. x = 3, y = 2C. x = 6, y = 1D. x = 6, y = 2 Match each product of powers with its simplified expression.57.52545.5215656,5-5?54:54:595205.550 You want to start saving for your childs college tuition. But you are a poor grad student / teaching assistant. Once you graduate you promise to start saving. If today (2022) is year 0, you will begin saving $18,000 per year, three years from now (first deposit in 2025). You will save for a total of 16 years (2040). In 2037, your child will make withdrawals from the account for a total of 4 years (2037-2040). The 2037 withdrawn amount will be $50,000 and each year the withdrawn amount will increase by 10%. Your child will let the remaining money sit in a savings account for another 30 years with a planned withdrawal at the end of 2070. Interest rates are expected to be 3% forever. How much will be in this account in 2070? Note that all deposits and withdrawals are done only in September of each year (including the final end 2070 withdrawal)! The pickup truck has a changing velocity because the pickup truck A.can accelerate faster than the other two vehicles B.is traveling in the opposite direction from the other two vehiclesC.is traveling on a curve in the roadD.needs a large amount of force to move please get right i need awnser today Pepsin functions normally in a low or high pH? Which of the following is an example of associated value:A.the reliability of an e-commerce website staying up and running.B.the cost of a pair of sneakers.C.the durability of a car.D.the experience received when eating at a restaurant. approximate the function at the given value of x, using the taylor polynomial of degree n = 3, centered at c = 27. (round your answer to three decimal places.) Silver metal reacts with nitric acid according to the equation: 3Ag (s) + 4HNO3 (aq)3AgNO3 (aq) +NO (g) + 2H2O (lig) What volume of 1.15 M HNO3 (aq) is required to react with 0.784 g of silver? What do careers in the same cluster have in common? Income and benefits Skills and knowledge Location and cost of living Job demand and employment rates thinking about different variables and research to help you have some concrete ideas to think about as we keep moving through the semester. For this assignment, come up with any psychological variable (something that relates to psychology, and varies) and think about a) what type of variable it might be, b) what sort of graphical display you might use to visualize it, and c) a simple research question you might ask about it. New projects or products can provide positive indirect effects as well as negative effects. Which one of the following appears to be a negative indirect effect? Select one: A. Orders for your complementary products are expected to increase. O B. Customer orders of supplies for the firm's existing O C. The new machine required for the project uses less O D. Variable costs are expected to decrease since the firm products are expected to decrease. electricity than the existing machine. can order larger quantities. John lives 27 miles from school. Steven lives 9 more miles from schoolthan John.How many miles does Steven live fromschool? The Confederate Constitution guaranteed the protection of slavery and Please help me with this!! What advantages would working with large pixels have over working with small pixels What emotion is being shown in thisWhat could love, the unsolved mystery, count for in the face of this possession of self-assertion which she suddenly recognized as the strongest impulse of her being! my brain decided to not function in an easy question- PLEASE HELP. The area of this trapezium is 180cm?Work out X.9cm13cm12cm A corporate expects to receive $36,721 each year for 15 years, if a particular project is undertaken.There will be an initial investment of $100,827.The expenses associated with the project are expected to be $7,322 per year.Assume straight-line depreciation, a 15-year useful life, and no salvage value.Use a combined state and federal 48% marginal tax rate, MARR of 8%, determine the project's after-tax net present worth. 4. review the third capture file (project part ii-b) and determine what is happening with the ppp traffic that you are investigating in this capture. what else is involved? a. research one of the protocols relating to ppp and describe it here. d. describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture) e. take a screenshot of the actual packets within the capture file that you observed this behavior.