Answer the following questions and provide the answer in details:
Question 1: Describe the TCP three-way handshake.
Name the TCP flags which are used to perform the handshake.
What is the handshake used for? Which two of the six TCP flags were set in the packets used to cause the TCP session to be closed or terminated?
Question 2: Briefly describe how Zenmap or Wireshark could be used to compromise the confidentiality, integrity, or availability of a network (choose one).
Question 3: Identify one type of security vulnerability that you will be while wireshark or nmap.
Describe that vulnerability and name the tool which provided information about the vulnerability or exposed the weakness.
Briefly explain the Ping process and show what protocol is used to implement the Ping?
Can someone provide the answer with reference to computer networking?