qb ANS
qb ANS
a)Fix vulernabilities b)only Identify vulernabilities c) Identify and exploit vulernabilities d)only exploit
vulnerabilities
SOLUTION:
C) Identify and exploit vulernabilities
2. What type of symmetric key algorithm using a streaming cipher to encrypt information?
A. RC4 B. Blowfish C. SHA D. MD5
SOLUTION:
a) RC4 uses streaming ciphers.
3. It is an __________- threat and is an action performed by an activity with the intention to violate security.
SOLUTION:
a) Unintentional
4.____________ is someone who uses their extensive knowledge of malicious purposes, and steal other data
without the owners knowledge.
SOLUTION:
a)Internet things of device
6. Which type of a hacker would be penetration tester be? ? (CO1), (RE), (DL-E), (IL-VI)
a)Black hat b)White hat c) Grey hat d)red hat
SOLUTION:
b) White hat
7. which of the following breaches has the potential for the greatest long lasting effect on customers?
a)Execullus bcbs b)Gmail c)yahoo d)bing
SOLUTION:
a)Execullus bcbs
SOLUTION:
Ramsomeware
SOLUTION:
c)yahoo
SOLUTION:
c)authorization.
Unit-II
a)Certificate Authorities
b)Symmetric Encryption
c)Digital Certificates
d)Algorithms
SOLUTION:
a)Certificate Authorities
a)Symmetric
b)Asymmetric
c)Hashing
d)cracking
SOLUTION:
b)Asymmetric
SOLUTION:
14. When you download a file from the Internet, which of the following might appear next to the hyperlink for
the file?
a)Symmetric Key
b)Asymmetric Key
c)Both Symmetric and Asymmetric Keys
d)Hash
SOLUTION:
d)Hash
15. When plaintext is encrypted, which of the following describes what someone who intercepts the message
can do to the ciphertext?
a)See it
b)Store it
c)Understand it
d) See it and Store it
SOLUTION:
d) See it and Store it
16. A plaintext message, along with a key, are imputed into an algorithm to produce an output in _____________.
SOLUTION:
clpher text
SOLUTION:
a)Kerckhoffs's Principle
SOLUTION:
b)Key
a)Symmetric
b)Asymmetric
c)Algorithm
d)cracking
SOLUTION:
b)Asymmetric
20. Which of the following represents the most commonly used hashing algorithm today?
a)SHA-256
b)SHA-1
c)MD-5
d)MD-256
SOLUTION:
a)SHA-256
UNIT III
1. IP Addresses are :
a. Physical b. Logical c. 16 bits long d. 48 bits long
2 . Which Boolean operation does a host use to determine its network ID?
a. OR b. XOR c. AND d. NOT
3. If the source determines that the destination is on the same network, which of the following is not involved
in the communication?
a. A router b. A switch c. A MAC address d. An IP address
6. When the source determines that the destination is on a different network, it requests a MAC address from:
a. The destination b. Its default gateway
c. Its DNS server d. It does not request a MAC address in this scenario
9. What is removed and re-added each time traffic moves through a router?
a. Frame b. Packet c. IP Addresses
When you send network communications from your laptop through your employer’s network and then
use it at home:
The IP address is the same.
The MAC address is the same.
Both the MAC and IP addresses are the same.
Both the MAC and IP addresses are the different.
Correct answer
The MAC address is the same.
UNIT IV
1.If an FTP server and a Web server are running on the same machine, how does network communication get
to each of those services?
a. They have different MAC addresses b. They have different IP addresses
c. They have different ports d. They have different logons
8. If a switch does not know the destination MAC address, what will the switch do with a frame?
a.Drop it
b. Forward it to the default gateway
c. Flood it
d. Send an ARP
Correct answer
Flood it
UNIT - V
a)Drops
b)Broadcasts
c)Re-routes
d)Reframes
SOLUTION:
a)Drops
2. Content snooping and censoring, through Deep Packet Inspection, are carried out by which of these?
SOLUTION:
3. _______________approaches used by an IDS and IPS uses a baseline measurement to help detect malicious
traffic?
SOLUTION:
Anamoly based
SOLUTION:
Social Engineering
SOLUTION:
d)Backdoor
6. A weatherbug program that comes with other programs unknown to the user be classified as a:
a.Logic Bomb b. Trojan horse c. RAT d. Rootkite
7. Malware that purposely lets time elapse before executing is a:
8. Bundled software that users might not know about if they don’t read the EULA (End User License
Agreement) is most accurately called a:
SECTION B
UNIT I
PERSONAL SECURITY
2.The World Wide Web is a fantastic resource, but as with everything, it has its
risks. This guide will give you some hints and tips on staying safe while enjoying this
new online world. Follow these step-by-step instructions to help you stay safe
online.
SOLUTION:
Step 1: Make sure your antivirus software is up to date..
Step 2: Check that the Windows firewall is switched on. your screen should alert
you to any problems.
Click this flag to open the Action Center to check whether everything is working
properly.
Step 3: If you have an earlier version of Windows, a red shield-like icon in the
system tray will appear if the Windows firewall isn’t switched on. Click it to see
options for rectifying the problem.
SOLUTION:
Block unwanted ‘spam‘ email as this should also block most phishing
messages.
Internet Explorer 8 warns you against known phishing websites via its
SmartScreen Filter. First, check that the filter is switched on.
Open the Safety menu and place your mouse pointer over SmartScreen Filter
to open a sub-menu.
If one of the menu options is Turn On SmartScreen Filter, you’ll need to click
that. (You can use the same menu to check a site you’re suspicious of or to
report an unsafe website.)
Now, if you stumble on one of these phishing websites by mistake, the
address bar will turn red. If this happens, close the window or click Go to my
home page instead.
Use strong passwords. To find out how, read our guide ‘How to choose a
password’.
Be careful about the information you give about yourself online – for
example, when using blogs, forums and social networking sites. Identity
thieves may be able to piece together a lot about you just by using public
information.
4. Illustrate some of the steps you can take, and should keep your system safe from
almost all security threats.
SOLUTION:
SOLUTION:
6. List out some of the Programming languages that are useful to hackers
SOLUTION:
Compute
r
S.
Description Platform Purpose
No.
Languag
es
Web hacking
Web Hacking
Client side *Cross
2 JavaScript
scripting language platform JavaScript code is executed on the
client browse.
Web Hacking
Web Hacking
Language used to
*Cross
4 SQL communicate with
platform Using SQL injection, to by-pass web
database
application login algorithms that are
weak, delete data from the database,
etc
7. List of top 5 key finder software for cracking the system. SOLUTION:
8. Enable communication, Use straight through Ethernet cable for the following
cabling:
Switch to router
Switch to PC or server
Hub to PC or server
SOLUTION:
9. Enable communication, Use crossover cables for the following cabling: Switch to
switch
Switch to hub
Hub to hub
Router to router
Router Ethernet port to PC NIC
PC to PC
SOLUTION:
10.Write down the steps for , how do you set a static IP address in Windows 7, 8.
SOLUTION:
1. Click Start Menu > Control Panel > Network and Sharing
Center or Network and Internet > Network and Sharing Center.
2. Click Change adapter settings.
3. Right-click on Wi-Fi or Local Area Connection.
4. Click Properties.
5. Select Internet Protocol Version 4 (TCP/IPv4).
6. Click Properties.
7. Select Use the following IP address.
8. Enter the IP address, Subnet mask, Default gateway, and DNS server.
9. Click OK.
UNIT II
SECTION B
INTRODUCTION TO CRYPTOGRAPHY
11. Cryptography is a method of protecting information and communications.
Describe how this technique works, explain in detail. (CO3), (RE), (DL-E), (IL-I)
SOLUTION:
TYPES OF ENCRYPTION
12. Encrypt the message “HELLO MY DEAR,” using the appropriate key between the
sender and receiver.
13. Use the shift cipher with key = 15 to decrypt the message “WTAAD.” And
explain.
14. Use the shift cipher with key = 15 to encrypt the message “HELLO.”
The binary operation XOR (stands for eXclusive OR) is a binary operand (as are
AND, OR, etc) from Boole algebra. This operand will compare two bits and will
produce one bit in return. That bit will be equal to 1 if the two compared bits were
different, 0 if they were equal. Xor encryption is commonly used in several
symmetric ciphers (especially AES). A symetric cipher is simply a cipher in which the
key is used for encryption and decryption process. The XOR operand is so applied to
each bit between the text you want to encrypt and the key you'll choose. Examples
are better than words, let's take the word "xor". We want to encrypt it with the key
"cle". First we have to convert the input and the key in binary representation :
Then we compare each bit with the XOR operand. Which will give you this :
16.Write down the steps for how to set up the Windows 7 firewall to protect your
computer against malicious activity. :
SOLUTION:
1. From the Start menu, click Control Panel, then click System and Security
2. Under Windows Firewall, select either Check firewall status to determine
whether the firewall is turned on or off, or Allow a program through Windows
Firewall to allow a blocked program through the firewall
2. Select program features
Click Turn Windows Firewall on or off from the left side menu
Configure the settings for your home/work (private) or public network
Click OK to save your changes
Turn on Windows Firewall for each network location you use - Home or work
(private) or Public
1. Click What are network locations? for more information on network types
2. Domain network locations are controlled by your network administrator and
can't be selected or changed
3. Select Turn on Windows Firewall under the applicable network location
type (in image below, both locations are selected)
4. Select Notify me when Windows Firewall blocks a new program for
each network type, if the box is not already checked
5. Click OK to save your changes
CERTIFICATE AUTHORITIES
17. List out of the different types of SSL certificate types that can be purchased.
SOLUTION:
FIREWALL SETUP
18. Sketch out, how institution can be safer from internet attackers and set up
firewall. Use the below hint:
SOLUTION:
19. Turn on the Firewalls in both windows 7 and Windows 10 machines, Show the
ping result from Windows 7 machine to Windows 10 machine and vice versa.
SOLUTION:
Turn Windows Defender Firewall on
1. Select the Start button.
2. Select Settings > Update & Security > Windows
Security > Firewall & network protection.
3. Select a network profile.
4. Under Windows Defender Firewall, switch the setting to On. If your
device is connected to a network, network policy settings might prevent
you from completing these steps. For more info, contact your
administrator.
20.Turn off the firewalls in both Windows machines and then check the ping
results.
SOLUTION:
Turn Windows Defender Firewall off
1. Select the Start button.
2. Select Settings > Update & Security > Windows
Security > Firewall & network protection.
3. Select a network profile.
4. Under Windows Defender Firewall, switch the setting to Off. Turning off
Windows Defender Firewall could make your device (and network, if you
have one) more vulnerable to unauthorized access. If there's an app you
need to use that's being blocked, you can allow it through the firewall,
instead of turning the firewall off.
UNIT III
COMPARISON CHART
BASIS FOR
MAC IP
COMPARISON
Bits It is 48 bits (6 bytes) hexadecimal IPv4 is a 32-bit (4 bytes) address, and IPv6 is
Retrieve Address ARP protocol can retrieve MAC RARP protocol can retrieve IP address of a
22. Without knowledge of a destination network or a default route, what will a router do to a packet with
an unknown destination network?
Solution:
Write about:
Drop the packet
Send a message back to the source
23. What changes with each hop that a packet takes towards a destination?
Solution:
Write about MAC Address
24. With a subnet mask of 255.255.0.0, what are the IP addresses would be on the same network?
Solution:
Write from mac address
10.0.0.10
10.0.1.1
25. What would be the subnet mask on a network that has five host bits? How?
Solution:
Write from 255.255.255.224
26. When you send network communications from your laptop through your employer’s network and
then use it at home, what difference you feel?
Solution:
27. What identifies which portion of an IP address is the Network ID and which portion is the host ID?
Solution:
Write from Subnet mask
28. Given an IP address of 10.10.10.10, and a subnet mask of 255.0.0.0, what is the network ID?
Solution:
29. How the data delivered in the same network using subnet mask?
Solution:
The source doesn't actually need the destination's mask because if they are on the same
network their subnet masks will be the same anyway. After logically ending the destination IP
address of 10.10.1.2 with the source mask of 255.255.255.0, the resultant network ID matches the
network ID of the source 10.10.1.0.
This lets the source know that the destination is on the same network and traffic can be delivered
directly.
30. why the packets are discarded while routing a packet? Solution:
Now, host A's default gateway has the actual traffic meant for the destination. Routers maintain tables called,
get this, routing tables that contain destination networks and directions for the router, who to send the traffic
to next.
If the routers routing table doesn't have knowledge of the destination network, it can have a default route
which means a specific router interface on a different router to send traffic to. That other router interface will
have a better idea of how to get to the destination. Without knowledge of the destination network or a default
route, a router will drop a packet and send an error message back to the source through a protocol known as
ICMP, Internet control message protocol.
UNIT IV
31. If an FTP server and a Web server are running on the same machine, how does network
communication get to each of those services?
Solution:
32. What field does a switch use to learn where devices are?
Solution:
33. When a DHCP server is on a different network than the DHCP client, how does the DHCP server know
from which scope to give the client an address?
Solution:
DYNAMIC ROUTING:
38. Explain how the Interior Gateway Protocol is differ from Exterior Gateway Protocol?
Solution:
UNIT V
Unit-V
FIREWALL
1. Write down some of the firewall programs that can help improve your computer's
security.
SOLUTION:
2.Write down the list of firewall rules that apply to incoming traffic in networks.
SOLUTION:
Accept new and established incoming traffic to the public network interface
on port 80 and 443 (HTTP and HTTPS web traffic)
Drop incoming traffic from IP addresses of the non-technical employees in
your office to port 22 (SSH)
Accept new and established incoming traffic from your office IP range to the
private network interface on port 22 (SSH)
Accept means to allow the traffic through,
reject means to block the traffic but reply with an "unreachable" error, and
The rest of each rule consists of the condition that each packet is matched
against.
3. Write down the several firewall techniques and each firewall may use two or
more than two techniques in concert.
SOLUTION:
Packet filters: – This firewall technique is observed the entering and
discharging the network of each packet. Packets filters admit or discard it
depend on user-defined rules. Packet filtering is quite efficient and
transparent to users, but it is hard to build up. Packets filter used to liable
to IP spoofing.
Application gateway: – Application gateway used to apply safety method
to definite applications, such as Telnet and FTP servers. Application
gateways are very effective, but can inflict presentation poverty.
Circuit-level gateway: – Circuit-level gateway is concerned to security
device especially when UDP or TCP connection is going to establish. When
connection comes visible then packets can run among the hosts without
additional checking.
Proxy server:-Proxy server interrupts all messages incoming and outgoing
the network. The proxy server successfully hides the true network
addresses.
SOLUTION:
Step 1: Request information. ...
Step 2: Ask the recursive DNS servers.
Step 3: Ask the root name servers.
Step 4: Ask the TLD name servers.
Step 5: Ask the authoritative DNS servers.
Step 6: Retrieve the record.
Step 7: Receive the answer.
SOCIAL ENGINEERING
5. By using RAT tool how the attacker can attack the sytem,for that give the cycle
process of the system.
SOLUTION:
46. What is Trojanhorse? How it differs from Logic bombs?
47. Which Remote Access Trojan affects the Administrative Access?
ROOTKIT BACKDOOR SPYWARE ADWARE AND PUP:
SECTION C
SOLUTION:
Assets
ID Name Description Trust Levels
1 Library Assets relating to students, faculty
Users and members, and librarians.
Librarian
1. User The login credentials that a student or a (2) User with Valid
1 Login faculty member will use to log into the Login Credentials
Details College Library website. (4) Librarian
(5) Database
Server
Administrator
(7) Web Server
User Process
(8) Database
Read User
(9) Database
Read/Write User
1. Personal The College Library website will store (4) Librarian
2 Data personal information relating to the (5) Database
students, faculty members, and librarians. Server
Administrator
(6) Website
Administrator
(7) Web Server
User Process
(8) Database
Read User
(9) Database
Read/Write User
DENIAL-OF-SERVICE
SOLUTION:
It involves flooding a computer resource with more requests than it can handle
consuming its available bandwidth which results in server overload.
This causes the resource (e.g. a web server) to crash or slow down significantly so
that no one can access it.
Using this technique, the attacker can render a web site inoperable by sending
massive amounts of traffic to the targeted site.
DoS attacks violate the acceptable use policies of virtually all internet service
providers.
Denial-of-Service attacks typically target high profile web site servers belonging to
banks and credit card payment gateways.
6.By given details draw a pictorial chart representation for motivation on attacker.
SOLUTION:
7. Draw out the human threat network access with the help of following
components
a) Asset b) Vector c) Actor d) Motive e) Impact
SOLUTION:
THE AAA MODEL
8. The client establishes a connection with the router. Analyzes the given
statement and clarifythe AAA local authentication with suitable diagram.
SOLUTION:
SOLUTION:
UNIT II
INTRODUCTION TO CRYPTOGRAPHY
11. Use the shift cipher with key = 15 to encrypt the message “CLASSROOM.” &
explain.
12. Use the shift cipher with key = 4 to encrypt the message “RVSCAS” & explain.
INTRODUCTION TO CRYPTOGRAPHY
13. Illustrate symmetric-key cryptography and write down the classifications of
symmetric-key cryptography
HASHING
14. Estimate below diagram and explain the terms which is used in this hash
function.
15. Draw a diagram for good and bad function in hashing. (CO2), (AP), (DL-E), (IL-I)
CERTIFICATE AUTHORITY
16. List out the best SSL certificate providers of 2019 and write down the role of
certificate authority.
SOLUTION:
Comodo SSL.
DigiCert.
Entrust Datacard.
GeoTrust.
GlobalSign.
GoDaddy.
Network Solutions.
RapidSSL.
Certificates given by CAs build trust between the users and the providers
because they can ensure the validity of each other's identities
and authorities.
WEBSITE DEMO
17. Create a webpage for “Kannan Department” and illustrate various types of table
within it. & explain why we need to do testing?
18. Create a webpage for “Pragathi Stores” and illustrate inner & outer table within
it. & explain the importance of testing in web page creation?
SOLUTION:
20. We have to set the two IP addresses in the same network since we have
connected the PCs using a switch. After assigning IP address successfully, we have
to check the two PCs are able to communicate with each other.
SOLUTION:
Static IP configuration
Go to the Start window, and open the “Network and Sharing Center” .
After opening the “Network and Sharing Center”. Then click the Change
Adapter Settings
After Select the Local Area Connection
After Selecting the Local Area Connection click mouse right button to select
the properties
Open Command Prompt and type ipconfig to check the IP address and Subnet
mask.
Go to Advance Settings.
Select the four type of file sharing methods and enable that one by one.
Open the command Prompt to ping the Client IP Address to check the File
sharings if that Succcess or Lost.
UNIT III
LOCAL COMMUNICATION:
22. How to view the network Activity using wireshark? Demonstrate for local Communication. (CO4)()
(DL-)(IL-)
Wireshark is a network protocol analyzer that can be installed on Windows, Linux and Mac. It provides a
comprehensive capture and is more informative than Fiddler.
To use:
1. Install Wireshark.
REMOTE COMMUNICATION:
23. How to view the network Activity using wireshark? Demonstrate for remote Communication.
Host
Enter the IP address or host name of the target platform where the Remote Packet Capture Protocol
service is listening. The drop down list contains the hosts that have previously been successfully
contacted. The list can be emptied by choosing “Clear list” from the drop down list.
Port
Set the port number where the Remote Packet Capture Protocol service is listening on. Leave open to
use the default port (2002).
Null authentication
Select this if you don’t need authentication to take place for a remote capture to be started. This
depends on the target platform. Configuring the target platform like this makes it insecure.
Password authentication
This is the normal way of connecting to a target platform. Set the credentials needed to connect to the
Remote Packet Capture Protocol service.
24. Demonstrate the name resolution Query in DNS through Wireshark. (CO4)()(DL-)(IL-)
Name Resolution
Name resolution tries to convert some of the numerical address values into a human readable format. There are
two possible ways to do these conversions, depending on the resolution to be done: calling system/network
services (like the gethostname() function) and/or resolve from Wireshark specific configuration files. For
details about the configuration files Wireshark uses for name resolution and alike, see Appendix B, Files and
Folders.
The name resolution feature can be enabled individually for the protocol layers listed in the following sections.
3) Request:
In response to the offer Client requests the server . Note that still client is not having the ip
address. Now client makes request to the server for the IP information being offerd by the
DHCP server .
A client can receive DHCP offers from multiple servers, but it will accept only one DHCP offer
and broadcast a DHCP request message. Based on Transaction ID field in the request, servers
are informed whose offer the client has accepted. When other DHCP servers receive this
message, they withdraw any offers that they might have made to the client and return the
offered address to the pool of available addresses.
4) Acknowledge:
Server responds all the Ip Add/mask/gateway/dns/wins info along with the
acknowledgement packet.
Last but not least, if none of the DHCP server is availble in your network or the connection is
broken to your DHCP server APIPA would automatically assign a unique class B IP address to
each machine in the range of 169.254.x.x range.
BINDING MAC ADDRESS TO IP ADDRESS:
26. How to bind MAC address to IP Address. (CO4)()(DL-)(IL-)
27. When the Source determines that the destination is on different network, how to request their MAC
address? (CO4)()(DL-)(IL-)
28. Compare Local and Remote communications and identify which is best for sending packets ? (CO4)()
(DL-)(IL-)
UNIT IV
41. If an FTP server and a Web server are running on the same machine, how does network
communication get to each of those services? [CO5][RE][DL-E][IL-I]
42. What field does a switch use to learn where devices are? [CO5][RE][DL-M][IL-V.I]
43. When a DHCP server is on a different network than the DHCP client, how does the DHCP server know
from which scope to give the client an address? [CO5][RE][DL-E][IL-I]
44. How Clients learn who their DNS servers are? [CO5][RE][DL-C][IL-I]
HOW SWITCHES WORK:
45. How the switches identify the destination MAC Address? [CO5][RE][DL-E][IL-V.I]
DYNAMIC ROUTING:
FIREWALL
41.Write down some of firewall programs that can help improve your computer's security. [CO3][RE][DL-E]
[IL-I]
42.Write down the list of firewall rules that apply to incoming traffic in networks.
[CO3][RE][DL-E][IL-I]
43.Write down the several firewall techniques and each firewall may use two or more than two techniques
in concert. [CO3][RE][DL-E][IL-I]
SOCIAL ENGINEERING
44. By using RAT tool how the attacker can attack the system, for that give the cycle process of the system.
[CO3][RE][DL-E][IL-I]
DNS AND DHCP SERVER CONFIGURATION
45. How does DNS work and list out their steps. [CO3][RE][DL-E][IL-I]
SECTION C
UNIT III
If you are using Linux, type the ifconfig command. You should see your
23. Define the Classful addressing.
LOCAL COMMUNICATION:
24. How to view the network Activity using wireshark? Demonstrate for local Communication.
REMOTE COMMUNICATION:
25. How to view the network Activity using wireshark? Demonstrate for remote Communication.
UNIT IV
31. Write a PowerShell script that asks users to choose between these four items:
33. Write a Bash shell script for creating the user accounts [User names & Passwords] and
34. Write a bash shell script for getting input from user as domain names & IP addresses and construct the
mapping table.
PORTS:
37. If an acknowledgement specifically referencing byte numbers of the data sent doesn't come back TCP
resends the unacknowledged bytes; UDP doesn't do this. So which one is better?
38. How does the switch learn where MAC addresses are in the first place?
AUTONOMOUS SYSTEM:
40. What that meant was that each and every network needed its own Reverse ARP server. Costs and
resources were obvious issues, that called for a new protocol. Then along came BootP, Bootstrap particle. The
advantage BootP afforded over Reverse ARP was that the BootP messages were encapsulated in UVP data
grams at layer 4, which were encapsulated in IP packets at layer 3. What good is that?
UNIT V
Educate the entire organization regarding the security threats and policies
of organization to avoid mistakes
Offer a safe-harbour for subordinates
Establish communication & delegation
Consider bluffing through the stating of false details
Exercise useful caution
Use negotiation when interrogating a caller
Rely only on trusted sources
Create a policy to manage protesters
Make your trash unappealing for Dumpster drives
2.Write down the steps for Installing and Configuring a DHCP Server.
SOLUTION:
SOLUTION:
After Selecting the Local Area Connection click mouse right button to select
the properties
Open Command Prompt and type ipconfig to check the IP address and Subnet
mask.
Go to Advance Settings.
Select the four type of file sharing methods and enable that one by one.
Open the command Prompt to ping the Client IP Address to check the File
sharings if that succcess or Lost.
On a computer, go to Gmail.
Open the message.
Next to Reply , click More . Note: If you're using classic Gmail, click the Down
arrow .
Click Report phishing.
4. Draw the network intrusion detection system and intrusion prevention system.
SOLUTION:
.
5. Configure and sketch out Social Engineering Attack Lifecycle? .
6. SOLUTION:
SOCIAL ENGINEERING
32. How To Avoid Pretexting Social Engineering Attack?
33. Configure and sketch out Social Engineering Attack Lifecycle? .
34. Write down the steps for Installing and Configuring a DHCP Server.
VIRUS Vs WORM
49. Configure primary and Secondary DHCP Servers in the same network and analyze the communication.
50. Determine the events that are transpired and identify which systems and networks were affected?