IS3110 Lab 5

Good Essays
1. What are the differences between ZenMap GUI and Nessus?

NMAP is run most of the time on a host and port discovery, Nessus is usually installed on servers and takes it to the next level. It analyzes the ports and looks for potential security issues

2. Which scanning application is better for performing a network discovery Reconnaissance probing of an IP Network infrastructure? NMap

3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus

4. How many total scripts does the Intense Scan using ZenMap GUI perform? Runs 36 Scripts

5. From the Zen Map GUI pdf report page 6, who ports and services are enabled on the Cisco Security Appliance Device? 22 / TCP Open SSH Cisco SSH 1.25

6. What is the source IP address of the Cisco Security Appliance Device? 172.30.0.1

7. How many IP hosts were identified in the Nessus vulnerability Scan? Depends on the scan

Nine IP Addresses scanned, 49.39 seconds, 256 IP Addresses (5 hosts) scanned in 5433.44 Seconds

8. While Nessus provides suggestions for remediation steps, what else does Nessus provide that can help you assess the risk impact of the identified software vulnerability? It provides a way either through a patch or update that will allow you to repair that vulnerability
9. Are open ports necessarily a risk? Why or why not? An open port is only a risk if it is not supposed to be open. There are always ports that will need to be open , but ones that have no need to be open should be closed.
10. When you identify a known software vulnerability, where can you go to access the risk impact of the software vulnerability?
It’s located in the server section of the application, or a software icon

11. Specify what CVE-2009-3555 is and what the potential exploits are, and assess the severity of the vulnerability.
It is a list of what the potential exploits are and the severity of the vulnerability. It attempts to provide

You May Also Find These Documents Helpful

  • Powerful Essays

    is3110 lab 5

    • 1037 Words
    • 5 Pages

    IS3110 LAB 5 Identify Threats and Vulnerabilities in an IT Infrastructure 1. What are the differences between ZeNmap GUI (Nmap) and Nessus? NMAP is primarily a host detection and port discovery tool. Instead of using Nessus to look for specific vulnerabilities against a known quantity of hosts, NMAP discovers active IP hosts using a combination of probes. On the other hand Nessus takes the open ports into account and notifies you if these ports have potential security vulnerabilities attached…

    • 1037 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    Lab #6: Assessment Worksheet 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most. 2. Based on your executive summary…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 Week5 Lab

    • 503 Words
    • 2 Pages

    Week 5 Laboratory Disaster Recovery Back-up Procedures and Recovery Instructions Learning Objectives and Outcomes Upon completing this lab, students will be able to: Relate how to lower RTO with properly documented back-up and recovery steps Understand the inversely proportional relationship between RTO and redundancy. Understand the process of defining IT system and application recovery procedures Understand the risks of using external e-mail as a backup and storage solution for production data…

    • 503 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Lab 6

    • 734 Words
    • 3 Pages

    Lab 6 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities there are to your infrastructure. You need this so that you know where the most attention needs to be focused on. 2. Based on your executive summary produced in Lab #4 Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    RISK-THREAT-VULNERABILITY PRIMARY DOMAIN IMPACTED Unauthorized access from public Internet User destroys data in application and deletes all files Hacker penetrates your IT infrastructure and gains access to your internal network Intra-office employee romance gone bad Fire destroys primary data center Communication circuit outages Workstation OS has a known software vulnerability Unauthorized access to organization owned Workstations Loss of product data Denial of service attack…

    • 626 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3110 lab 3 asesment

    • 476 Words
    • 3 Pages

    Assesment Lab #3: Assessment Worksheet Lab 3 1. What is the goal or objective of an IT risk management plan? - The purpose of the Risk Management Plan is to define how risks will be managed, monitored and controlled throughout the project. 2. What are the five fundamental components of an IT risk management plan? -The components of a Risk Management Plan are: Risk Identification, Risk Analysis, Risk Evaluation, Risk Monitoring and Review. 3. Define what risk planning is. - Risk planning…

    • 476 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 Unit 8 Lab

    • 586 Words
    • 2 Pages

    Lab #8: Assignment Worksheet Develop an Outline for a Business Continuity Plan for an IT Infrastructure 1. How does a BCP help mitigate risk? BCPs help mitigate an organization’s risks by ensuring that the organization is better prepared for disaster. 2. What kind of risk does a BCP help mitigate? Organizational risk 3. If you have business liability insurance, asset replacement insurance, and natural disaster insurance, do you still need a BCP or DRP? Why or why not? Yes you still need BCP AND…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110

    • 382 Words
    • 2 Pages

    IS3110 Unit 1 Assignment 1: Application of Risk management Techniques Threats, Vulnerabilities and like hood of occurrence. Does not include fire suppresion or tornado fail over site on case of a nature disaster like a tornado. Offices are on a state that has a high risk of tornados. Occurrence High. Does not have any backup solution. We need at least a in house backup and outside backup solution in case of a disaster Occurrence high. Not redundancy. If primary site is down all the business…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    order. What I would say to an executive is that the cost of value to your company is greatest when your system is compromised on hardware that has the most valued data within the company and when backup is down long enough to the point of no return. 5. Identify risk mitigation solutions User downloads and clicks on an unknown e-mail attachment: Effective email attachment filtering and restrictions reduce the likelihood of malicious content entering the network. Workstation OS has a known software…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    IS3110 U7L1

    • 1068 Words
    • 7 Pages

    IS3110 Lab7 Student Name: Tom Fletcher Submission Requirements Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_U7L1_Firstname_Lastname Email to: SMichnick@itt-tech.edu Due By: 6:00 PM CDT, Wednesday August 6, 2014 Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment. Please refer to Pages 46-52 of the IS3110 Student Lab Manual when working on this lab. Lab #7 – Perform…

    • 1068 Words
    • 7 Pages
    Powerful Essays