1) Various testing techniques are used when the networking devices are installed in the network? How are those techniques different than red and blue teaming? Do they overlap to certain extent? Ans: Red and Blue teaming are testing techniques used in an established network where devices are already installed. Certain tests like conformance with security policy might overlap. 2) Describe the two types of penetration testing (Red Teaming and Blue Teaming), and explain the difference between these techniques. Ans: Blue teaming is less expensive and done more frequently. It is some thing known to everyone. Red teaming is done more stelthily. and very expensive and done less frequently. Red teaming brings out hidden vulnerabilities of the system whereas blue teaming is don eto check if obvious vulnerabilities are not present. 3) A strong Linux/Unix password is one that is long (greater than 10 characters at least) and complex (contains both upper and lower case letters, special characters and numbers) Creating a strong Windows password is somewhat more complicated. Why? Ans: Versions of Windows prior to Windows 2000 use LanMan password hashes, which have several associated weaknesses. First, LanMan is not case sensitive, all alphabetic characters are converted to uppercase. This effectively reduces the number of different combinations a password cracker has to try. Second, all LanMan passwords are stored as two 7 character hashes. Passwords that are exactly 14 characters long will be split into two 7 character hashes. Password less than 14 characters will be padded up to 14 characters. The splitting of the hash into two causes LanMan passwords to be less resistant to password cracking