Question: PART A a . ) List the pentesting stages. b . ) Mention three tools taught in the lab, used for the demonstration purpose of
PART A
a List the pentesting stages.
b Mention three tools taught in the lab, used for the demonstration purpose of attacking the WPA wifi enabled network, along with their functions.
c Write the commands used to manually change the wireless card from managed mode to monitor mode.
d Briefly explain the following:
l White hat hacker
iI Grey hat hacker
iii. Black hat hacker
PART B
a Differentiate between spoofing and snooping, along with examples.
b List and explain three methods of achieving network security.
c Differentiate between vulnerability, threat, and attack.
a What is the use of the DNS
b Briefly explain the four stages the DNS uses in order to resolve host domain names to IP addresses.
c What are the four most common attacks in Data link layer?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
