Question: Show dos with a vms . Show a social engineering with kali toolbox maybe phising. Show dns security extensions. All with screenshots and explainingTwo common

Show dos with a vms. Show a social engineering with kali toolbox maybe phising. Show dns security extensions. All with screenshots and explainingTwo common tasks you will have to do when working in the IT industry (in whatever role) are:
keeping yourself up to date with new techniques and protocols as you encounter them.
advising managers (perhaps non-technical managers) within your company about the relative merits of different technologies or giving advice about news stories.
Some companies organise regular "show and tell" sessions where staff take it in turns to present new technologies to each other - this is a good way of learning and of spreading awareness, and this assignment will address both issues.
You are required to choose two topics from the following list:
Network Traffic Analysis
DNS Security Extensions
Social Engineering
DoS/DDoS
For each of the two selected topics, you should research and explain it. This might include explaining what they are, how they work, what are their benefits and drawbacks. (Keep the security aspect in mind)
NOTE: Each task must be addressed differently, with one having a theoretical focus, and the other having a practical focus. Include screenshots and explain the screenshots of any practical activity you have done.
WARNING: As always, ensure you do not break any laws or act unethically while conducting practical demonstrations. If in doubt, seek permission first.
Layout of Report:
This report must be formatted and submitted as one document. The report should look presentable with the target audience being a peer. It must at least have:
Cover Page
Title
Contents section/page at the start,
Brief introduction to the report,
Two substantial parts (tasks) of this assignment.
Conclusion
Reference page
A reader of your report must be able to navigate the document, so ensure that your sections/sub-sections are named appropriately and numbered if they are to be considered useful.
Show dos with a vms . Show a social engineering

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!