Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Week 5 Critical Thinking Project

Week 5 Critical Thinking Project

Q Please complete the following Critical Thinking Case Projects that align with this week’s TestOut.com Network Pro learning modules. Record your answers in a Word Document and submit it. 1. How does a command injection attack a web application? 2. How does salting the hash protect your network? 3. What is the target of ARP spoofing? 4. What is the role of a CA in a PKI? 5. Which authentication protocol would you choose if you needed to use smart cards? 6. Which protocol is the secure alternative to Telnet? 7. What is the difference between SFTP and FTPS? 8. Which protocol is added to HTTP for secure Web browsing? 9. With a site-to-site VPN, which devices are configured as the VPN tunnel endpoints? 10. What does PPTP use for encryption? What does L2TP use? 11. What tools can help you find backdoors? 12. What do you need in order to configure two-factor authentication? 13. How does an IPS differ from an IDS? 14. How can packet sniffing and port scanning software be used to improve the security of your network? PreviousNext Week 5 Critical Thinking Project

View Related Questions

Solution Preview

1.A command injection attack injects and executes unwanted commands on the application. The commands are executed with the same privileges and environment that are granted to the application. 2.Salting the hash adds random bits to the password before hashing takes place, thereby producing an entirely different hash value for the password. Because the hacker does not know the extra random bits, the rainbow table will be of no value.