problem1. Briefly describe how the Security Configuration and Analysis Tool (SCAT) snap-in in MMC (Microsoft Management Console) can be employed for securing a computer.
problem2. Illustrate how booting into SafeMode can assist to eradicate malware.
problem3. By means of Group Policy, it is probable to configure security policies in a computer. How can the Group Policy console be accessed from command prompt?
problem4. Illustrate the five phases an attacker or ethical hacker undertakes to gain access to a network. Demonstrate with the help of diagram.
problem5. Throughout the Footprinting phase, often DNS interrogation permits the attacker to get much information about the network. Why is it so?
problem6. Describe two ways to thwart network reconnaissance in network.
problem7. Make a distinction between human based social engineering and computer based social engineering.