Answered step by step
Verified Expert Solution
Question
1 Approved Answer
PART A a . ) List the pentesting stages. b . ) Mention three tools taught in the lab, used for the demonstration purpose of
PART A
a List the pentesting stages.
b Mention three tools taught in the lab, used for the demonstration purpose of attacking the WPA wifi enabled network, along with their functions.
c Write the commands used to manually change the wireless card from managed mode to monitor mode.
d Briefly explain the following:
l White hat hacker
iI Grey hat hacker
iii. Black hat hacker
PART B
a Differentiate between spoofing and snooping, along with examples.
b List and explain three methods of achieving network security.
c Differentiate between vulnerability, threat, and attack.
a What is the use of the DNS
b Briefly explain the four stages the DNS uses in order to resolve host domain names to IP addresses.
c What are the four most common attacks in Data link layer?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started