Security configuration and analysis tool


Question1. Briefly describe how the Security Configuration and Analysis Tool (SCAT) snap-in in MMC (Microsoft Management Console) can be employed for securing a computer.

Question2. Illustrate how booting into SafeMode can assist to eradicate malware.

Question3. By means of Group Policy, it is probable to configure security policies in a computer. How can the Group Policy console be accessed from command prompt?

Question4. Illustrate the five phases an attacker or ethical hacker undertakes to gain access to a network. Demonstrate with the help of diagram.

Question5. Throughout the Footprinting phase, often DNS interrogation permits the attacker to get much information about the network. Why is it so?

Question6. Describe two ways to thwart network reconnaissance in network.

Question7. Make a distinction between human based social engineering and computer based social engineering.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Security configuration and analysis tool
Reference No:- TGS05506

Expected delivery within 24 Hours