Question: Show dos with a vms . Show a social engineering with kali toolbox maybe phising. Show dns security extensions. All with screenshots and explainingTwo common
Show dos with a vms Show a social engineering with kali toolbox maybe phising. Show dns security extensions. All with screenshots and explainingTwo common tasks you will have to do when working in the IT industry in whatever role are:
keeping yourself up to date with new techniques and protocols as you encounter them.
advising managers perhaps nontechnical managers within your company about the relative merits of different technologies or giving advice about news stories.
Some companies organise regular "show and tell" sessions where staff take it in turns to present new technologies to each other this is a good way of learning and of spreading awareness, and this assignment will address both issues.
You are required to choose two topics from the following list:
Network Traffic Analysis
DNS Security Extensions
Social Engineering
DoSDDoS
For each of the two selected topics, you should research and explain it This might include explaining what they are, how they work, what are their benefits and drawbacks. Keep the security aspect in mind
NOTE: Each task must be addressed differently, with one having a theoretical focus, and the other having a practical focus. Include screenshots and explain the screenshots of any practical activity you have done.
WARNING: As always, ensure you do not break any laws or act unethically while conducting practical demonstrations. If in doubt, seek permission first.
Layout of Report:
This report must be formatted and submitted as one document. The report should look presentable with the target audience being a peer. It must at least have:
Cover Page
Title
Contents sectionpage at the start,
Brief introduction to the report,
Two substantial parts tasks of this assignment.
Conclusion
Reference page
A reader of your report must be able to navigate the document, so ensure that your sectionssubsections are named appropriately and numbered if they are to be considered useful.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
