Networking and Protocols Report Each answer requires at least one academic source and should be written following APA style. A general style guide can be found within the classroom and if you have any...

1 answer below »
Networking and Protocols Report
Each answer requires at least one academic source and should be written following APA style. A general style guide can be found within the classroom and if you have any questions, please feel free to contact me if this resource is unable to help you. The minimum word count for Part 1 is 1000 words. The minimum word count for Part 2 is 1000 words.
Part 1
Answer the following questions:
1. Identify two attacks that use wireless or mobile networks. Describe the attack and how it is implemented. What can be done to mitigate this type of attack?
2. Research and describe two vulnerabilities presented by concepts discussed in the Multimedia Networking chapter. This may include, but is not limited to, streaming services, VoIP, or QoS.
3. Describe the process of the Diffie-Hellman key exchange process. Draw out an example of how this exchange happens. This will consist of a graphical representation of the Diffie-Hellman process and a textual step by step description.
4. You have been able to use Wireshark to see how your host and the web server is able to communicate securely. Research two attacks, one on the client side and one on the server / service side, can put the user or server at risk. Ensure that you identify which attack is associated with the client and which is associated with the server. What is that attack? How does the attack work? How can the client or server mitigate those attacks?
5. Identify and describe three mechanisms that are used to create as secure connection with a web server
Part 2
Answer the following questions:
1. Describe three vulnerabilities associated with TCP or UDP. What can be done to mitigate or prevent these vulnerabilities from being exploited?
2. Describe the benefits of using TCP over UDP. Why is there a need to use UDP?
3. Compare and contrast two ways in which a TCP connection ends (graceful vs abrupt shutdown).
4. Identify an attack that uses ICMP. Describe the attack and how it is implemented. What can be done to mitigate this type of attack?
5. Describe three reasons why a ping command would not work when trying to reach a destination.
6. Identify one attack that uses ARP or attacks the network’s Link Layer. Describe these attacks and provide a real-world example for each of these attacks. A realworld example means that it has occurred.
7. Research how you could change the MAC address on a system. Describe the following:
o The process for changing the MAC address.
o How would an attacker use this for nefarious purposes?
o Describe a situation where this has occurred. This is another example of an attack that has occurred in the lab or in the wild
Answered 2 days AfterMay 09, 2021

Solution

Himanshu answered on May 12 2021
27 Votes

1

Part – 1
Ans. 1 – Mobile Networks and Wireless we have two common method to using the internet
in daily life. Wireless networks provides fast and reliable network connectivity....

Submit New Assignment

Copy and Paste Your Assignment Here