For this assignment you will be using written responses, 12-point Times New Roman or Calibri font, single spaced. Each question will require some outside research and pertains to cybersecurity. The...

1 answer below »

For this assignment you will be using written responses, 12-point Times New Roman or Calibri font, single spaced. Each question will require some outside research and pertains to cybersecurity. The final question should be answered in around 250 words or more.




  • In your Linux VM, what is the command to install the network cracking tool Aircrack-ng?

  • Assuming you are using Aircrack-ng to capture traffic on a network that is on channel 11, and the Access Point (AP) you are looking at has a bssid of 00:4B:17:U2:11:70, what is the full command you will use to capture the network traffic (Hint – airodump-ng is a tool used with Aircrack-ng)?

  • What is the hashing algorithm utilized by the National Security Agency (NSA)?

  • What is the major downside or flaw to MD5 hashing compared to SHA-256 or SHA-512?

  • What is the difference between TCP and UDP? What does TCP and UDP each stand for, respectively?

  • You are working in network security at a company with 30 employees in it. You notice traffic that you consider to be irregular and narrow down your search to the following ports: 80, 21, 3389, and 123. What do each of these port protocols represent?



Part II:



  • Based off of the ports in question 6, you believe that this may be a possible networking incident. You need to think fast and act on your feet! In what order do you look at the four ports based on the possible threat they pose – and why did you choose that order? Please explain

Answered 2 days AfterNov 22, 2022

Answer To: For this assignment you will be using written responses, 12-point Times New Roman or Calibri font,...

Shubham answered on Nov 25 2022
40 Votes
CYBERSECURITY
Question 1
In the Linux VM, to install network cracking tool Aircrack-ng the command
used is:
sudo apt-get update
sudo apt-get install -y aircrack-ng
Question 2
The command for capturing traffic on network is:
airodump-ng -c 11 - -bssid 00:4B:17:U2:11:70 -w capture - -ivs ath
Question 3
SHA is the hashing algorithm that is used by NSA and it is published by NIST as the FIPS PUB 180 (Ghafarian, 2018). It is designed with the use of digital signature standards that produces 160-bit hash value.
Question 4
As compared with SHA-256 or SHA-512, MA5 is slower. It is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here