Question: Assignment Content Complete labs 1 and 2 in the NETLAB. Answer the following short feedback and submit. From EH lab (1)/(2) What is NSLOOKUP

Assignment Content\ Complete labs 1 and 2 in the NETLAB. Answer the following short feedback and submit.\ From EH lab

(1)/(2)

\ What is NSLOOKUP used for?\ Do a quick web search at why PFsense is such a popular choice to use as a firewall. What did you find out?\ Would the SERVER command be effective against a remote web server behind a firewall in a private IP network?\ If so, how could an attacker gain "back side" or access to the private network the web server occupies to potentially use a\ different attack method?\ Do you see any way a web server can protect itself from this type of penetration?\ From lab 2:\ What does Time to Live mean?\ Is there a danger to a packet with infinite TTL? Why or why not?\ What do you think you could do with succesful packet crafting as a bad guy? Give a short detail as to your dastardly plan!\ What are SYN, ACK packets? Why are they so important to reliable network traffic flow?

 Assignment Content\ Complete labs 1 and 2 in the NETLAB. Answer

Assignment Content Complete labs 1 and 2 in the NETLAB. Answer the following short feedback and submit. From EH lab 1/2 1. What is NSLOOKUP used for? 2. Do a quick web search at why PFsense is such a popular choice to use as a firewall. What did you find out? 3. Would the SERVER command be effective against a remote web server behind a firewall in a private IP network? 4. If so, how could an attacker gain "back side" or access to the private network the web server occupies to potentially use a different attack method? 5. Do you see any way a web server can protect itself from this type of penetration? From lab 2: 6. What does Time to Live mean? 7. Is there a danger to a packet with infinite TTL? Why or why not? 8. What do you think you could do with succesful packet crafting as a bad guy? Give a short detail as to your dastardly plan! 9. What are SYN, ACK packets? Why are they so important to reliable network traffic flow

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!