You are on page 1of 2

1. What does crafting IP packets involve? Give an example.

Ans: To transport data over a network, Internet Protocol (IP) packets must
be created and customized, a process known as “crafting”. The data being
communicated, as well as source and destination addresses, are all included
in an IP packet.
For example, to send an email from our computer to a server, for instance
we would need to produce an IP packet that contained the email message,
the IP address of the email server in question, and our computer’s source IP
address. To accomplish this, we would utilize a piece of software such as
packet creation tool or a network protocol analyzer, that enables us to
construct and alter Ip packets.
The fields of the packet, such as the version of the IP protocol being used,
the length of the packet, the time-to-live (TTL) value, and the checksum,
would then be specified with the proper values. Once the IP packet has
been produced, it is prepared to be transmitted over the network using a
protocol like TCP or UDP.

2. What is the risk factor using public wi-fi? What is the cyber hygiene you
should follow while using public wi-fi?
ANS: Using public Wi-Fi can be dangerous since it is frequently left
unprotected, making it simple for hackers or other bad guys to access it and
steal important data like passwords, credit card numbers, or personal
information.
Here are some suggestions for maintaining excellent cyber hygiene while
utilizing public wi-fi:
 Use caution when public wi-fi to access confidential information or
conduct financial activities. Wait until we are connected to a private
and secure network.
 To encrypt our data and make sure that no one can see what we are
doing online while connected to a public wi-fi network, use a virtual
private network (VPN).
 Ensure that the security settings on our device are current set to
update automatically. This will assist in preventing known security
issues on our device.
 To prevent our device from automatically connecting to public wi-fi
networks, turn off automatic wi-fi connectivity.
 Before connecting to a public wi-fi network, to make sure it is a
legitimate network by looking at the network name and login page.
 For each of our accounts, choose a strong, one-time password, and
whenever possible, turn on two-factor authentication (2FA).
 When using a public wi-fi network, avoid downloading files or clicking
on links from untrusted sources.
We may reduce the dangers of using public wi-fi by adhering to these best
practices, and we can also safeguard our data and personal information.

3. Specify best practices for password protection.


Ans:

1. Describe four main purposes of a firewall


2. What is a NetBIOS null session?
3. Why do hackers often exert more effort to attack computers identified as domain controllers?
4. What is cyber kill chain and what are the phase of cyber kill chain?

You might also like