Top-Rated Free Essay
Preview

100 NT2580 Lab01 Final

Satisfactory Essays
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
100 NT2580 Lab01 Final
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

Lab #1 - Assessment Worksheet
Performing Network Reconnaissance using Common Tools
2580
Course Name and Number: _____________________________________________________ kevin anderson
Student Name: ________________________________________________________________

Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you explored the common tools available in the virtual lab environment. You used
Wireshark to capture and analyze network traffic, OpenVAS to scan the network, reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart.
Lab Assessment Questions & Answers
1. Name at least five applications and tools used in the lab.
FileZilla, net witness investigator, Open VAS,PuTTY,Wireshark.

2. What is promiscuous mode? it allows Wireshark to capture packets to any host on the same supnet or VLAN

3. How does Wireshark differ from NetWitness Investigator?
NetWitness allows analysts and view the packets

4. Why is it important to select the student interface in the Wireshark? it runs in a lab setting

5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? yourname_IntenseScan 6. Name at least five different scans that may be performed with Zenmap.
Intense Scan, Basic Recon,fisheye,pingscan,

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

2

7. How many different tests (i.e., scripts) did your Intense Scan perform?
255

8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report.

9. How many total IP hosts did Zenmap find on the network?
255

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT 1310 Unit 8 Lab 1

    • 595 Words
    • 2 Pages

    The most critical part, the Cable and Fiber Preparation where the fiber is mounted, is the ferrule. The Ferrule is a long, thin cylinder with the fiber mounted in the center hole. The center hole is sized to match fiber's cladding diameter which is usually 125um. When fiber connector ferrules are made from several types of materials including ceramic(Zirconia), stainless steel and plastic. The ferrule's job is to center and align the fiber and protects it from mechanical damage. The end of fiber is at the end of the ferrule, where the fiber end is polished smooth either flat or with a curvature. The ferrule is mounted in the connector body and then the connector body is attached to the fiber optic cable structure. Finally, a strain-relief rubber boot protects the connector-cable junction.…

    • 595 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Lab

    • 91 Words
    • 1 Page

    Transfer the uniformly weighted crushed tablets into a beaker and add 100cm3 of dilute sulfuric acid to the beaker.…

    • 91 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4 Lab

    • 370 Words
    • 2 Pages

    Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…

    • 370 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Lab 1

    • 319 Words
    • 4 Pages

    1. It is important to know how many system words will fit in a primary storage device on a computer so you know how big of a storage unit you have. The more system words that will fit in a primary storage device, the more memory you have on your computer.…

    • 319 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Lab

    • 140 Words
    • 1 Page

    1.) Test for viscosity: Since DNA molecules are long strands that anneal to each other, they can be very viscous in liquid if they're at a high enough concentration. If I notice the sample sticking together while pipetting it, I'll often know that I have a lot of DNA in the sample.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Netw 310 Lab #1

    • 257 Words
    • 2 Pages

    1. There are three patterns outlined on the screen. Which one of these is identifying the noise floor?…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 10

    • 1546 Words
    • 8 Pages

    12. Take a screen shot showing of the Event Viewer console, showing the Critical & Warning custom view by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl + V.…

    • 1546 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Lab 1

    • 918 Words
    • 4 Pages

    * The greater the distance between receptors and stimulus the lesser sensitive are the stimulus. The smaller area, the more sensitive.…

    • 918 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Answer the following questions about the results of the virtual lab activity. Record your answers in the boxes.…

    • 307 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    100 NT 2580 U2A1

    • 465 Words
    • 2 Pages

    First, what is the definition of Window of Vulnerability (WoV)? According to www.techopedia.com, an IT dictionary and more for the IT word, the definition states that “vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. Vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.”¹ To calculate this time frame or window of vulnerability mean that we much think about a number of attributes to the situation. The specific attributes we must use in the calculation are the time it takes the attack to start and when the attack is found and removed or fixed. The time from the start to the removal or fix is the window of vulnerability.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    cloud

    • 2069 Words
    • 9 Pages

    For this lab, we will only need to connect to vlab-PC1. The computer vlab-PC1 is the computer on the left side while vlab-PC2 is on the right. If you leave the cursor on the PC icon for a few seconds, a tool-tip message will appear indicating the hostname of the PC. Open vlab-PC1 and log in as Administrator with the password password.…

    • 2069 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    user requirement analysis

    • 11349 Words
    • 46 Pages

    EVIE is a JISC-funded project which is aiming to develop a virtual research environment for staff…

    • 11349 Words
    • 46 Pages
    Powerful Essays
  • Good Essays

    Network Monitoring Tools

    • 672 Words
    • 3 Pages

    Network monitoring tools can have many important functions that can increase the scaleability and usefulness of a network. They ensure that the computers and devices on the network are functioning at the highest level possible, and are available. They also can help increase the productivity and ease of an IT department's job, so it's important that they choose the right product that suits their needs the best.…

    • 672 Words
    • 3 Pages
    Good Essays