Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PART A a . ) List the pentesting stages. b . ) Mention three tools taught in the lab, used for the demonstration purpose of

PART A
a.) List the pentesting stages.
b.) Mention three tools taught in the lab, used for the demonstration purpose of attacking the WPA 2 wifi enabled network, along with their functions.
c.) Write the commands used to manually change the wireless card from managed mode to monitor mode.
d.) Briefly explain the following:
l. White hat hacker
iI. Grey hat hacker
iii. Black hat hacker
PART B
2. a.) Differentiate between spoofing and snooping, along with examples.
b.) List and explain three methods of achieving network security.
c.) Differentiate between vulnerability, threat, and attack.
3. a.) What is the use of the DNS?
b.) Briefly explain the four stages the DNS uses in order to resolve host domain names to IP addresses.
c.) What are the four most common attacks in Data link layer?
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

What do you think of the MBO program developed by Drucker?

Answered: 1 week ago