Answered step by step
Verified Expert Solution
Question
1 Approved Answer
c . ) Mention four tools taught in the lab, used for the demonstration purpose of attacking the WPA 2 Wi - Fi enabled network,
c Mention four tools taught in the lab, used for the demonstration purpose of attacking the WPA WiFi enabled network, along with their functions.
Marks
d Write the commands used to manually change the wireless card from managed mode to monitor mode.
Marks
PART B ANSWER ANY FOUR QUESTIONS
a What are the stages involved in performing pentests?
Marks
b List and explain three methods of achieving network security.
Marks
c Differentiate between vuinerability, threat, and attack.
Marks
a What is the use of the DNS List the four stages the DNS uses in order to resolve host domain names to IP addresses.
Marks
b Explain two types of encryption algorithms, along with their applications.
Marks
c What are the four most common attacks in Data link layer?
Marks
a What are the four protocols that use asymmetric key algorithms?
Marks
b Explain the three basic types of firewall categories.
Marks
c List and explain three importance of network security for businesses.
Marks
a Why is access control important?
Marks
b Explain two types of access control strategies.
Marks
c As a security specialist, how can you mitigate possible threats on data confidentiality?
Marks
a Explain two types of encryptions, along with examples of their encryption algorithms.
Marks
b Define the following:
i Cypher
ii Data masking
iii. Steganography
Marks
Marks
iv Cryptology
Marks
v Cryptography
Marks
Marks
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started