Reference no: EM133792496
Assignment: Creating and Sustaining Competitive Advantage
Why is it important to train personnel in security if it is not part of their job routine? Give examples to justify your position.
Part I
A. What functions do these WLAN applications and tools performon WLANs: airmon-ng, airodump-ng, aircrack-ng, and aireplay-ng?
B. Why is it critical to use encryption technique so na wireless LAN? Which encryption method is best for use on a WLAN (WEP, WPA, WPA2)?
C. What security counter measures can you enable on your wireless access point (WAP) as part of a layered security solution for WLAN implementations?
D. Why is it so important for organizations, including home owners, to properly secure their wireless network?
E. What risks, threats, and vulnerabilities are prominent with WLAN infrastructures?
F. What is the risk of logging on to access points in airport sorother public places?
G. Why is it important to have a wireless access policy and to conduct regular site surveys and audits?
H. What is a risk of using you rmobile cell phone or externalWLANasaWiFi connection point?
Part II
A. What is the first Nmap command you ran in this lab? Explain the switches used.
B. What are the open ports when scanning 100.16.16.50 (TargetVulnerable01) and their service names.
C. What is the Nmap command line syntax for running an MS08-067 vulnerability scan against 100.20.9.25 (TargetWindows04)?
D. Explain why the MS08-067 exploitisbad.
E. What operating system did Nmap identify for the three IP addresses you scanned in the lab?
Part III
A. Compare the has h values calculated for Example .txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.
B. If you were to create a new MD5 sumor SHA1 sum hash value for the modified Example.txt file, would the value be the same or different from the hash value created in Part 3 of the lab?
C. If you want secure email communications without encrypting an email message, what other security countermeasure can you deploy to ensure message integrity?
D. When running the GnuPG command, what does the-eswitch do? a. Extractb. Encrypt c. Export
E. What is the difference between MD5 sumand SHA1 sum hashing calculations? Which is better and why?
F. Name the cryptographic algorithms used in this lab.
G. What do you need if you want to decrypten crypted messages and files froma trusted sender?
H. When running the GnuPG command, what does the-dswitch do? a. Detachb. Destroy c. Decrypt
I. When creatinga GnuPG encryption key, what are ways to createentropy?