Preview

Lab 8 for Network Security, Firewalls and VPNs

Satisfactory Essays
Open Document
Open Document
486 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 8 for Network Security, Firewalls and VPNs
Lab 4
1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?
2) What is the purpose of defining a Policy definition as a first step in performing a Nessus vulnerability scan?
a. Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is a policy definition of it. IT is a free program that can be downloaded but donations are accepted. IT is also an open source program so people are constantly improving it.
3) What five things can you configure as part of a vulnerability scan?
i. You can configure:
1. Data Leakage
2. Compliance priority
3. Users
4. Scan options
5. Plugins
4) Explain both the information systems security practitioner and hacker perspectives of using a security scanning application such as Nessus.
a. Vulnerability scans performed from external hosted servers give the same perspective as an attacker. Two types of hacking are White hats which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. Black Hats are individuals that break into systems or networks that are not authorized to.
5) How many tests does the Nessus Lab #4 Server Farm Scan perform?
a. 6
6) Describe what each of these test display withing the Scan Report Details.
a. The test include the severity from high, medium or low. Scans and test also include, parameters that control technical aspects, timeouts, number of host, type of port scanner, policy checks, service detection scan settings, UNIX compliances and many other checks that can give vulnerabilities.
7) How does Nessus differ from ZeNmap GUI and which tool would you use for network discovery and inventory versus identifying software vulnerabilities?
8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?
a. 261
9) Did the targeted

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    5. The Policy definition defines the parameters and operations of the vulnerability scan. This is like the configuration parameters of the scan itself.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    A network operating system is a piece of software that is utilized to manage the network resources available to the clients on your network. As a central point of management you have the ability to create and manage user accounts, security templates(group policy), allow users and systems access to file servers and printers, and control any information that is requested from outside your network. Proper utilization and configuration of your network operating system is essential for the security of your network. From the server you can place rules on each of your clients to limit the resources they have access to, while determining how much freedom they will enjoy on their systems.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    | Paste your answers to questions 1 through 16 in the document. Be sure to show your work.Perform the required problems.In your own words, summarize what you have learned concerning network commands available within the Windows operating system.…

    • 1560 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Answer: 1. Nessus is typically port scanner tool which considered open port to check security vulnerabilities whereas Nmap is purely host detection and port discovery tool.…

    • 692 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Paper

    • 292 Words
    • 2 Pages

    What was the DHCP allocated source IP host address for the student VM, DHCP Server, and IP default gateway router?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security Site Survey

    • 1000 Words
    • 4 Pages

    There are three labs supporting the Electronics programs: averaging 21 seats. There is one Network Lab designed to support individual networks with a capacity of 18 positions. The remaining labs support the Computer…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Summary of the Server, Events, Services, Object & Features to be tested and desired outcomes…

    • 5702 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    hacktivists

    • 370 Words
    • 2 Pages

    Hackers have been around for a very long time. Hacks can range from disrupting websites, cracking data bases and releasing untold amounts of sensitive or private data. There are two different types of hackers, white hats and black hats. White hats are hackers that help prevent people that are on the other side of the law. Some white hats were once black hats that may have been caught and decided to work with government agency’s such as the FBI rather than go to jail. Black hats are hackers that hack for things such as personal gain or to simply disrupt or gain access to information that they want. Almost all hackers have an alias or a handle such as Dark Dante or C0mrade.…

    • 370 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Software License Agreement

    • 3405 Words
    • 14 Pages

    In consideration of access to the source code and the rights to copy, modify and redistribute granted by the license, users are provided only with a limited warranty and the software's author, the holder of the economic rights, and the…

    • 3405 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Hacking Research Paper

    • 1380 Words
    • 6 Pages

    According to an article in Whatis.com, hackers primarily come in different shades or colors. The article goes on to say that these colors are significant in determining what kind of hacker he/she is. The lighter the color, the less harm a hacker intends. For example, a hacker with good intent and moral standing is called a white hat hacker. Another point made in the article was that the word “hat” after the color of the hacker is meant to be symbolic of old Western movies where the hero always wore a white hat and “bad guys” wore the black hats (Whatis.com). Black hat hackers, as you may have guessed, are the hackers who do intend harm. They deface websites, steal data, and exploit security flaws for personal gain. Black hats are sometimes called “crackers” as well because they crack programs and passwords to gain entry into a location where they are unauthorized to be (morebusiness.com). There are also hackers who are referred to as gray hat hackers. These are the hackers who have ethics, know what’s…

    • 1380 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    During performance testing the performance leads/analyst need to analyze the results of the test and provide the details to the team/management. This is a repetitive thing…

    • 983 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    first I want to say that there is an immense difference between coding, white hat hacking, and black hat hacking. The differences between these three is that coding is a programmer with limited experience who writes simple programs like on scratch, however, a coder can also be referred to a very experienced programmer like Dennis Ritchie or Linus Torvalds, a black hat hacker is a person with computer knowledge and is trying…

    • 402 Words
    • 2 Pages
    Satisfactory Essays

Related Topics