May 6, 2020
Elk Mountain Hotel case study
May 6, 2020


Complete a port scan.  Use NMAP for this.  Showcase the findings.

Use wireshark and perform a TCPFlood attack.  Record your findings.

Use Kali tools to perform a Hping3 attack.  Record your findings.

Write a 2 page paper that discusses your findings and what businesses should do to mitigate these attack vectors.


“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


"Are you looking for this answer? We can Help click Order Now"