1. Explain
in detail the 10 most commonly used TCP protocols and ports (show in table)
2. Explain
in detail the OSI Model (show layers, protocols, devices and other details in
table)
3. Explain
in detail along with the frequency and speed of IEEE 802.11 Standards (show in
table)
4. Explain in detail Symmetric and
Asymmetric Key and key certification
(show in table)
5. Explain in detail
Social Engineering and give 5 examples (show in table)
6. Explain
in detail Enumeration and give examples
7. Explain
in detail Port Scanning and Penetration Testing and provide examples and tools
used for both.
8. Explain
in detail Cryptography and give examples
9. Explain
in detail Hacktivism and give 5 examples (provide website links)
10. Explain
in detail and run network commands in Windows and Linux (do screen shots)
ping
(google.com)
ipconfig
tracert
(google.com)
nslookup
11. Explain in detail how computer information
technology can be used to help solve current pandemic issues (provide website
links)
The post 1. Explain
in detail the 10 most commonly used TCP protocols and ports (show in appeared first on Skilled Papers.