i need to complete this assignment in apa format instructions provided below

Answer the one question from each assigned section this week (sections 13.8 & 14.1 – 14.4). Each response should be 1-2 paragraphs in length. Type your numbered answers in a Word document (i.e. Section 14.1 Question 2, etc.). APA formatting is not required. If you use outside sources to support your answers, provide APA-style citations and a reference page.

Answer one of the following from Section 13.8:

  1. How do you defend against a Ping of Death attack?
  2. What does the sniffer-detect script with the NMAP utility allow you to do?
  3. What tools that can help you find backdoors?
  4. What can you do to prevent your network from becoming an amplifier for DoS attacks?
  5. What do you need to configure two-factor authentication?

Answer one of the following from Section 14.1:

  1. What type of recognition method is used by most virus scanning software?
  2. How does an IPS differ from an IDS?
  3. What is the advantage to using a network-based IDS instead of a host-based IDS?
  4. What should you regularly do when using a signature-based IDS?
  5. How can packet sniffing and port scanning software be used to improve the security of your network?
  6. Which device(s) can you use to discover open ports?

Answer one of the following from Section 14.2:

  1. Why should you perform a penetration test on your network?
  2. Which type of penetration testing provides you with the most accurate results regarding your network’s vulnerabilities?
  3. How does black box testing differ from grey box testing?
  4. In which stage of penetration testing do you create a fingerprint of your system?
  5. What is the difference between operations and electronic penetration testing?

Answer one of the following from Section 14.3:

  1. How does SecureDynamic differ from SecureSticky?
  2. How does DAI validate ARP packets on the network?
  3. What is the difference between enforcement and remediation servers?
  4. How does an A port violation occur? How can you resolve it?
  5. What does DHCP snooping do on your network?

Answer one of the following from Section 14.4:

  1. How does enticement differ from entrapment?
  2. What is your first step when responding to an incident?
  3. What information is included in the incident response plan?
  4. How do you handle any evidence you collect?
  5. What is the difference between a search warrant and a subpoena?
  6. In which stage(s) of the evidence life cycle should you be concerned about how the evidence is handled?
 
Looking for a Similar Assignment? Order now and Get a Discount! Use Coupon Code "Newclient"
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.