0% found this document useful (0 votes)
6 views3 pages

Ss 1

Uploaded by

20220802014
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

Ss 1

Uploaded by

20220802014
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1. a) What information can be collected using footprinting?

Also, explain
types and steps required to perform footprinting.

Answer:

●​ Information Collected Through Footprinting:


1.​ Domain names: Company-related domain details.
2.​ IP addresses: Identifying active IP ranges.
3.​ Network structure: Network architecture and devices.
4.​ Employee details: Information from LinkedIn, social platforms.
5.​ Open ports and services: For attack planning.
6.​ DNS details: Zones, server addresses.
7.​ System information: OS and version details.
8.​ Security configurations: Firewalls and policies.
●​ Types of Footprinting:
1.​ Active Footprinting: Interacting directly with the target (e.g., using ping,
traceroute).
2.​ Passive Footprinting: Collecting information indirectly (e.g., Google searches,
WHOIS lookup).
●​ Steps for Footprinting:
1.​ Gather domain information: Use WHOIS and DNS lookups.
2.​ Collect network details: Perform traceroutes and ping sweeps.
3.​ Identify open ports: Use tools like Nmap.
4.​ Research employees: Use LinkedIn, social media.
5.​ Analyze web presence: Explore subdomains, directories.
6.​ Document findings: Summarize all collected data.

1. b) Explain Security Architecture in Detail.

Answer:

●​ Definition: Security architecture is a framework for ensuring the security of an


organization’s IT infrastructure, addressing risks and vulnerabilities.
●​ Components:
1.​ Authentication: Validating user identities.
2.​ Authorization: Ensuring access control based on roles.
3.​ Encryption: Protecting data through cryptography.
4.​ Firewalls: Monitoring and controlling network traffic.
5.​ Intrusion Detection/Prevention Systems (IDS/IPS): Identifying and stopping
threats.
6.​ Incident Management: Processes to respond to security incidents.
●​ Steps to Build Security Architecture:
1.​ Define security requirements.
2.​ Identify risks and vulnerabilities.
3.​ Design controls and policies.
4.​ Implement security measures.
5.​ Monitor and update systems.

2. a) What is Malware? What are the Different Types of Malware (any 6)?

Answer:

●​ Definition: Malware (malicious software) is a program designed to harm, disrupt, or


exploit systems.
●​ Types:
1.​ Virus: Self-replicates and infects files.
2.​ Worm: Spreads across networks without user action.
3.​ Trojan Horse: Disguised as legitimate software.
4.​ Spyware: Collects user data secretly.
5.​ Ransomware: Encrypts files, demanding a ransom.
6.​ Adware: Displays intrusive ads.
7.​ Rootkits: Grants unauthorized access to systems.

2. b) Explain Packet Sniffing Process, Types, and Advantages of


Performing Packet Sniffing.

Answer:

●​ Definition: Packet sniffing involves capturing and analyzing network traffic.


●​ Process:
1.​ Identify the network to monitor.
2.​ Use tools like Wireshark or Tcpdump.
3.​ Capture packets and analyze headers/data.
●​ Types of Packet Sniffing:
1.​ Promiscuous Mode: Captures all packets on a network.
2.​ Non-Promiscuous Mode: Captures packets only meant for the host device.
●​ Advantages:
1.​ Troubleshooting: Identifies network issues.
2.​ Monitoring: Ensures security by detecting suspicious activity.
3.​ Performance Analysis: Optimizes network performance.
4.​ Education: Aids in understanding network protocols.
1.​

You might also like