Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part 2 Based on labs sessions you are requested to build a WAN topology of any organization using Cisco packet tracer. The design and configuration

image text in transcribed
Part 2 Based on labs sessions you are requested to build a WAN topology of any organization using Cisco packet tracer. The design and configuration of the topology should ensure that network is implemented securely as much as you can. The following five points should be deployed in your topology Routing (static or dynamic) & Switching VPN IPsec VLAN ACL Final pkt file of your design should be submitted along with screen shoots for testing the above mentioned five points Part 3: Lab Report. Provide an in-depth report of the following labs for Ubuntu 16.04 16.04 LTS: ARP Cache Poisoning Attack Race Condition Vulnerability The report must include screen dumps, scripts etc as evidence of you completing the task and will answer and address all the questions/tasks in the labs The length of your report will depend on the number of successful attacks you have implemented and whether you can advise on how to fax them. Irrelevant or background information will cost you marks. The intention is to produce a focused, detailed discussion of what you found, how you used it and how you could prevent others from using it. Exceptionally good reports may prove quite large so no formal word limit exists. A good quality report will also include some critical evolution of the exploits and the task required within the lab sheets If your report is addressing the questions above concisely it cannot be too large. If you only have a single vulnerability that you have discovered then I would expect the report to be short and you should expect to get lower maries. The code/scripts used in identifying and mitigating vulnerabilities will also help improve your marks. Part 2 Based on labs sessions you are requested to build a WAN topology of any organization using Cisco packet tracer. The design and configuration of the topology should ensure that network is implemented securely as much as you can. The following five points should be deployed in your topology Routing (static or dynamic) & Switching VPN IPsec VLAN ACL Final pkt file of your design should be submitted along with screen shoots for testing the above mentioned five points Part 3: Lab Report. Provide an in-depth report of the following labs for Ubuntu 16.04 16.04 LTS: ARP Cache Poisoning Attack Race Condition Vulnerability The report must include screen dumps, scripts etc as evidence of you completing the task and will answer and address all the questions/tasks in the labs The length of your report will depend on the number of successful attacks you have implemented and whether you can advise on how to fax them. Irrelevant or background information will cost you marks. The intention is to produce a focused, detailed discussion of what you found, how you used it and how you could prevent others from using it. Exceptionally good reports may prove quite large so no formal word limit exists. A good quality report will also include some critical evolution of the exploits and the task required within the lab sheets If your report is addressing the questions above concisely it cannot be too large. If you only have a single vulnerability that you have discovered then I would expect the report to be short and you should expect to get lower maries. The code/scripts used in identifying and mitigating vulnerabilities will also help improve your marks

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Records And Database Management

Authors: Jeffrey R Stewart Ed D, Judith S Greene, Judith A Hickey

4th Edition

0070614741, 9780070614741

More Books

Students also viewed these Databases questions

Question

Types of cultural maps ?

Answered: 1 week ago

Question

Discuss the various types of leasing.

Answered: 1 week ago

Question

Define the term "Leasing"

Answered: 1 week ago

Question

What do you mean by Dividend ?

Answered: 1 week ago