Preview

NT2580 Lab1

Satisfactory Essays
Open Document
Open Document
97 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Lab1
1 - Wireshark No FIleZilla Server Interface Yes Nessus Client No Tftpd32_SE Admin No Nessus Server No Nmap Zenmap Gui No
2 – pegar no meu VM depois
3 - Yes 4 packet responses
4 - The TTL on Windows was 128 while on Ubuntu the TTL was 64
5 - Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30
6 – Ping Scan
Quick Scan
Intense Scan
Regular Scan
Intense Scan, No Ping
7 - 36
Nbstat
Smb-os-discovery
Smbv2-enabled
8 - Nbstat gets the NetBIOS name, NetBIOS User, and NetBIOS MAC. Smb-os-discovery gets the OS, name and system time.
Smbv2 enabled is a protocol that 10.96.109.30 does not support
9 – 1
10 – pegar depois

You May Also Find These Documents Helpful

  • Good Essays

    Nt1210 Lab 3.1.3

    • 427 Words
    • 2 Pages

    Two chains are required to transmit power from the engine to the tire. A #35 duplex chain transmits power from the crankshaft of the engine to the main shaft. A #35 single strand chain transmits power from the output sprocket to the tire. To calculate the length of the chain necessary to last for 10^7 cycles of the main shaft, equations (5) is used:…

    • 427 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Lab

    • 91 Words
    • 1 Page

    Transfer the uniformly weighted crushed tablets into a beaker and add 100cm3 of dilute sulfuric acid to the beaker.…

    • 91 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4 Lab

    • 370 Words
    • 2 Pages

    Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…

    • 370 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4

    • 4542 Words
    • 19 Pages

    ________ is typically not referred to as a buffer type in critical chain project management.…

    • 4542 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 5

    • 800 Words
    • 4 Pages

    1. Is an external wall within 900mm of an allotment boundary to another property, 1.8m to another building that isn’t a class 10 building, or 3m from a brush fence?…

    • 800 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3

    • 472 Words
    • 2 Pages

    Fill in the blanks in the following table. Then use the table to answer the questions:…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Pt2520 Unit 6 Lab 1

    • 292 Words
    • 2 Pages

    24. What is the difference between the logical design and the physical design of a database?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    In this lab, you explored the common tools available in the virtual lab environment. You used…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | The Windows Media distribution server uses this TCP Out port to establish an HTTP connection to the origin server.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Yes, although such tools like these would automatically find security flaws with high degree of confidence that what it found was a flaw.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 251 Words
    • 2 Pages
    Satisfactory Essays