Question: PART A a . ) List the pentesting stages. b . ) Mention three tools taught in the lab, used for the demonstration purpose of

PART A
a.) List the pentesting stages.
b.) Mention three tools taught in the lab, used for the demonstration purpose of attacking the WPA 2 wifi enabled network, along with their functions.
c.) Write the commands used to manually change the wireless card from managed mode to monitor mode.
d.) Briefly explain the following:
l. White hat hacker
iI. Grey hat hacker
iii. Black hat hacker
PART B
2. a.) Differentiate between spoofing and snooping, along with examples.
b.) List and explain three methods of achieving network security.
c.) Differentiate between vulnerability, threat, and attack.
3. a.) What is the use of the DNS?
b.) Briefly explain the four stages the DNS uses in order to resolve host domain names to IP addresses.
c.) What are the four most common attacks in Data link layer?
 PART A a.) List the pentesting stages. b.) Mention three tools

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!