Discussion 1 Please answer each of the following questions:1. List a minimum of 2 pros of pentesting.2. List a minimum of 5 cons of pentesting.3. List at least 5 specific vulnerabilities that we have learned about, that pentesting looks for.4. Explain black box testing.5. Explain white box testing.6. Explain grey box testing.7. Discuss how often pentesting should be done.8. Discuss who should do pentesting. Discussion 2 Standard security management practice is to test security to confirm proper configuration, performance, and strength against attacks and exploits. When a firewall is updated or its settings modified, another round of firewall testing should be conducted.Some approaches to firewall testing that do not disrupt the production environment are:• Simulated firewall tests: Use an attack simulator to transmit attack packets to the firewall• Virtual firewall tests: Are performed in a virtualized network environment using a virtualization tool• Laboratory tests: Are run in nonproduction subnets on a duplicate of the production environmentAnswer the following question(s):1. Which approach do you think would be most effective? Why?
Last Completed Projects
topic title | academic level | Writer | delivered |
---|