Preview

operating system

Good Essays
Open Document
Open Document
464 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
operating system
1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application.

Zenmap is an application that is used to scan ports for networks. A scenario where it can be used is to scan the ports of a network to know exactly which ports are opened or closed thus allowing a network administrator to reduce the vulnerability of its network.

2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?
Nessus.

3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?

One must obtain a signed authorization form showing exactly what kind of test you are authorized to perform.

4. What is a CVE listing? Who hosts and who sponsors the CVE database listing website?

CVE listing is a dictionary of publicly known information security vulnerabilities and exposures. IT is hosted by the Office of Cybersecurity and Communications at the U.S. Department of Homeland Security

5. Can Zenmap GUI detect which operating systems are present on IP servers and workstations? Which option includes that scan?

Yes, the OS detection using TCP/IP stack fingerprinting option includes that scan.

6. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus vulnerability assessment scan?
One can use this information to create a policy of vulnerabilities that you want Nessus to scan for on that specific host.

7. Once a vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk mitigation solution?

You can check the report generated by Nessus, specifically in the hostname plugin ID which will give you a detailed description of the vulnerability found along with possible mitigation

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    The most important step in the fi ve-step hacking process is step 5, where the security practitioner must remediate the vulnerability and eliminate the exploit. What is the name and number of the Microsoft® Security Bulletin?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) What is the purpose of defining a Policy definition as a first step in performing a Nessus vulnerability scan?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    15) Which of the following defines the cycle used to address Windows threats and vulnerabilities? B) Discovery-analysis-remediation…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What constitutes a situation in which a penetration tester should not compromise or access a system as part of a controlled test?…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability ''MSO8-067"?…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking…

    • 838 Words
    • 4 Pages
    Better Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify…

    • 362 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Refers to scanning a system for vulnerabilities and reveals information about the target that is needed to access it.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    4. Did the static analysis tool find all the potential security flaws in the application?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays