Explain dynamic host configuration protocol.
[7 marks]Explain terms: Encryption, Decryption, Plain Text, Cipher Text.
[7 marks]What is OS Fingerprinting? Explain active and passive fingerprinting.
[7 marks]Explain public key cryptography.
[7 marks]Explain ARP poising and MAC spoofing.
[7 marks]Explain firewall and its types.
[7 marks]Explain wireless communication standards.
[7 marks]Explain WHOIS and DNS lookup.
[7 marks]Explain SNORT-NIDS.
[7 marks]Explain traffic timeline analysis in Wireshark.
[7 marks]Explain IP security architecture.
[7 marks]What is banner grabbing? Explain types of banner grabbing.
[7 marks]Explain internet security protocols.
[7 marks]Explain port scanning and its techniques.
[7 marks]What is Wireshark? Explain Wireshark Plugins.
[7 marks]Explain internet key exchange.
[7 marks]Explain intrusion detection system. Page 1 of 1
[7 marks]