In: Computer Science
1. If you can run “traceroute/tracert” between machines in your organization.List three concrete applications to use trace route for cybersecurity?
2.How to use” netstate/netstat” to discover malicious activities in your machine?
3. use Process Monitor “Procmon” show how to list all running processes that run “RegCreateKey” operation with unsuccessful results.
4.Show how to use Nmap to do IP scanning using TCP and ICMP and port scanning using Stealth FIN. Show the command and the output.
Answer 1
***********
Answer 2
***********
Answer 3
***********
find RegCreateKey right click and include RegCreateKey to create new filter
Answer 4
***********
if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)