Which encryption method is best for use on a wlan

Assignment Help Computer Engineering
Reference no: EM133792496

Assignment: Creating and Sustaining Competitive Advantage

Why is it important to train personnel in security if it is not part of their job routine? Give examples to justify your position.

Part I

A. What functions do these WLAN applications and tools performon WLANs: airmon-ng, airodump-ng, aircrack-ng, and aireplay-ng?

B. Why is it critical to use encryption technique so na wireless LAN? Which encryption method is best for use on a WLAN (WEP, WPA, WPA2)?

C. What security counter measures can you enable on your wireless access point (WAP) as part of a layered security solution for WLAN implementations?

D. Why is it so important for organizations, including home owners, to properly secure their wireless network?

E. What risks, threats, and vulnerabilities are prominent with WLAN infrastructures?

F. What is the risk of logging on to access points in airport sorother public places?

G. Why is it important to have a wireless access policy and to conduct regular site surveys and audits?

H. What is a risk of using you rmobile cell phone or externalWLANasaWiFi connection point?

Part II

A. What is the first Nmap command you ran in this lab? Explain the switches used.

B. What are the open ports when scanning 100.16.16.50 (TargetVulnerable01) and their service names.

C. What is the Nmap command line syntax for running an MS08-067 vulnerability scan against 100.20.9.25 (TargetWindows04)?

D. Explain why the MS08-067 exploitisbad.

E. What operating system did Nmap identify for the three IP addresses you scanned in the lab?

Part III

A. Compare the has h values calculated for Example .txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.

B. If you were to create a new MD5 sumor SHA1 sum hash value for the modified Example.txt file, would the value be the same or different from the hash value created in Part 3 of the lab?

C. If you want secure email communications without encrypting an email message, what other security countermeasure can you deploy to ensure message integrity?

D. When running the GnuPG command, what does the-eswitch do? a. Extractb. Encrypt c. Export

E. What is the difference between MD5 sumand SHA1 sum hashing calculations? Which is better and why?

F. Name the cryptographic algorithms used in this lab.

G. What do you need if you want to decrypten crypted messages and files froma trusted sender?

H. When running the GnuPG command, what does the-dswitch do? a. Detachb. Destroy c. Decrypt

I. When creatinga GnuPG encryption key, what are ways to createentropy?

Reference no: EM133792496

Questions Cloud

Develop problem statement and identify sample : Develop Problem Statement Identify Sample Discuss Research Paradigm Discuss Bias as it relates to the Study
What is the main diagnosis for mary rose : What is the Main diagnosis for Mary Rose? What differential diagnoses did you consider and why? What is your treatment recommendation and why?
What different answers of how we should go : What different answers of how we should go about the task of recapturing vocation. The streams are often confusing to Christians
How the use of the model will result in a more efficient : Finally, assess-in particular-how the use of this model will result in a more efficient and effective production facility.
Which encryption method is best for use on a wlan : Why is it critical to use encryption technique so na wireless LAN? Which encryption method is best for use on a WLAN (WEP, WPA, WPA2)?
What audience did museums cater to during these eras : Discuss the role of museums in the two earliest eras in the history of historic preservation. What audience, if any, did museums cater to during these eras?
Summarize the source and discuss the research study : Provide an APA formatted Citation (this should look like what you would include in a normal reference section. Summarize the source and discuss the research
Roles of a security manager in an organization : In an essay format, what issues and factors led to the growth of the private security industry in early 20th-century America up to the 1960s?
Describe reaction to ross ulbricht silk road case : On the discussion forum, describe your reaction to the Ross Ulbricht "Silk Road" case.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd