CYB 310 Module Three Lab Worksheet David Obi

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

310

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by JusticeRain3195

Report
CYB 310 Module Three Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Performing a Denial of Service Attack from the WAN Prompt Response In the lab section, “TCP Flood,” Step 11 , include your name after the command prompt and take a screenshot of your name with the output from running the tcpdump command. 1
Lab: Performing a Denial of Service Attack from the WAN Prompt Response In the lab section, “HTTP2 Flood,” Step 16, add your name at the command prompt after you run the capinfos HTTP2capture.cap command. Take a screenshot of your name and the output for the total number of packets captured in the Number of packets data. How can the Low Orbit Ion Cannon (LOIC) tool be used in the daily work an analyst would do? The LOIC can be used to detect website and/or application weaknesses by stress testing them. What are two examples of information the LOIC tool could retrieve? The LOIC tool can see weaknesses within a network and it can also open ports and send messages through them. 2
Lab: Implementing NAT and Allowing Remote Access Prompt Response In the lab section, “Understanding NAT,” Step 27, take a screenshot of the display of the output from the ping command executed in Step 8. In the lab section, “Secure Remote Login,” Step 34, take a screenshot of the VPN window after logging in to the network. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4