Lab Assessment Questions &, computer science homework help

Apr 27th, 2016
Price: $5 USD

Question description

Assessment Worksheet

Attacking a Virtual Private Network

Course Name and Number: _____________________________________________________

Student Name: ________________________________________________________________

Instructor Name: ______________________________________________________________

Lab Due Date: ________________________________________________________________


A properly configured virtual private network that uses IPSec and adheres very closely to best

practices, such as strong authentication, network segmentation, device validation, and posture

assessment, is very formidable and protects all types of information in transit from one location

to the other. In this lab, you learned how to use social engineering techniques to unlock the

secrets of a targeted individual or organization by attacking its virtual private network. You also

researched e-mail scams and used social engineering to create a believable spam e-mail to solicit

funds for a fictitious fundraising opportunity.

Lab Assessment Questions & Answers

1. What is the darknet?

A. An Internet for non-English-speaking people

B. The criminal side of the Internet

C. An Internet just for law enforcement

D. The old IPv4 Internet, which is being retired as IPv6 takes over

E. None of the above

2. What e-mail protocol does Marina and Rita’s Cupcakes use, and why is it important?

3. Text in an e-mail must match the URL to which it links: true or false?

4. Instead of relying just on a user ID and password system, VPN access can be protected by

tokens like SecurID and other ____________ methods.

5. In many instances an IP address is used to access a server rather than a URL because a URL is

more difficult to set up and easier to track: true or false?

6. A well-designed malicious e-mail campaign can expect ____________ number of responses, or

click-throughs, as a legitimate commercial e-mail campaign.

A. a smaller

B. a greater

C. about the same

7. Were Charlie Roberts and Susan Dougherty known to each other, and did they have a trust

relationship that could be exploited?

8. Which of the following steps can make VPN access more secure?

A. Assure Perfect Forward Secrecy during IKE key exchange

B. Allow access only from specific MAC addresses

C. Allow access only from specific MAC/IP address pairs

D. Use foreign words as passwords

E. Change password letters to numbers, such as all Ls to 7s and all Os to 0s

Tutor Answer

(Top Tutor) Rated_writer
School: Purdue University


Lab Assessment Questions & Answers
First Last Name
Name of University



1. What is the darknet?
B. The criminal side of the Internet
2. What e-mail protocol does Marina and ...

Studypool has helped 1,244,100 students

Review from student
" Thanks, good work "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1823 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors