The following is an example of what type of vulnerability?Th…

The following is an example of what type of vulnerability?The directory listing is not disabled on the server, and an attacker discovers they can simply list directories. The attacker finds and downloads the compiled Java classes, which they decompile and reverse engineer to view the code. The attacker then finds a serious access control flaw in the application. 

Given:IP address: 192.168.10.0/28Subnet Mask: 255.255.255.24…

Given:IP address: 192.168.10.0/28Subnet Mask: 255.255.255.240 You are given the CIDR notation with the slash prefix and the corresponding subnet mask.  Using this information, fill out the chart and provide the correct IP address for subnets 0-4 for the following: Network Address, 1st Host Address, Last Host Address, and Broadcast.   Subnet Network Address 1st Host Address Last Host Address Broadcast 0 [NetworkAddressSub0]  [1stHostAddress0] [LastHostAddress0] [Broadcast0] 1 [NetworkAddressSub1]  [1stHostAddress1] [LastHostAddress1] [Broadcast1] 2 [NetworkAddressSub2]  [1stHostAddress2] [LastHostAddress2] [Broadcast2] 3 [NetworkAddressSub3]  [1stHostAddress3] [LastHostAddress3] [Broadcast3]