[Solved] 1 Local Computer Create New Document Called Hacking Research Report Incudes Following Sect Q37266854

1. On your local computer, create a new document called Hacking Research Report that incudes the following sections: a. Executive Summary: Write a 2-3 paragraph summary of the information you uncovered in Parts 1 and 2 of this lab and how an attacker might be able to exploit this information. It may be helpful to write the Executive Summary last, after you have completed your analysis in the other sections of the research report. b. Methodology: Describe the tools and techniques that you used to conduct both the technical research and public domain research in this report. c. Technical Research Results: Summarize the results of your technical research into x128bit.com, iSkytap.com, and cloudparadox.com from Part 1 of the lab. d. Public Domain Research Results: Summarize the results of your public domain research into the targeted company from Part 2 of the lab. e. Findings and Conclusions: Present your detailed conclusions about each of the four companies (x128bit.com, iskytap.com, cloudparadox.com, and the company you chose in Part 2). f. Avenues of Further Research: Describe what additional research you might conduct to learn more about the four companies. If you were planning a hacking attack, what questions might you try to answer? Show transcribed image text 1. On your local computer, create a new document called Hacking Research Report that incudes the following sections: a. Executive Summary: Write a 2-3 paragraph summary of the information you uncovered in Parts 1 and 2 of this lab and how an attacker might be able to exploit this information. It may be helpful to write the Executive Summary last, after you have completed your analysis in the other sections of the research report. b. Methodology: Describe the tools and techniques that you used to conduct both the technical research and public domain research in this report. c. Technical Research Results: Summarize the results of your technical research into x128bit.com, iSkytap.com, and cloudparadox.com from Part 1 of the lab. d. Public Domain Research Results: Summarize the results of your public domain research into the targeted company from Part 2 of the lab. e. Findings and Conclusions: Present your detailed conclusions about each of the four companies (x128bit.com, iskytap.com, cloudparadox.com, and the company you chose in Part 2). f. Avenues of Further Research: Describe what additional research you might conduct to learn more about the four companies. If you were planning a hacking attack, what questions might you try to answer?
Expert Answer
Answer to 1. On your local computer, create a new document called Hacking Research Report that incudes the following sections: a. … . . .
OR

