Preview

NT2580 Lab 2

Satisfactory Essays
Open Document
Open Document
385 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Lab 2
1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application.
It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running.
2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?
Threats and vulnerabilities lead risks, if you don’t have then then you don’t have any risk of anyone getting into your network
3. Which application is used for Step #2 in the hacking process to perform a vulnerability assessment scan?
That would be Nessus is the application used.
4. Before you conduct an ethical hacking process or penetration test on a live production network, what must you do prior to performing the reconnaissance and probing and scanning procedures?
You must get written permission
5. What is a CVE listing? Who hosts and who sponsors the CVE database listing website?
A CVE (Common Vulnerabilities and Exposures) are known vulnerabilities and also show you how to patch them. They are from the Mitre Corporation but are under contract for Homeland Security and NCSD.
6. Can ZenMap GUI detect what operating systems are present on IP servers and workstations? What would that option look like in the command line if running a scan on 172.30.0.10?
Yes it can detect what OS are being used. The command would be –o.
7. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus vulnerability assessment scan?
You can tell the scan to only include windows vulnerabilities.
8. Once vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk mitigation solution?
At the CVE Website.
9. What is the major different between ZenMap GUI and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    7) How does Nessus differ from ZeNmap GUI and which tool would you use for network discovery and inventory versus identifying software vulnerabilities?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    Extended Service Sets - is a component of the IEEE 802.11 WLAN architecture that extends the range of mobility to a single Basic Service Set.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 4

    • 804 Words
    • 4 Pages

    1. What test does startup BIOS perform when you first turn on a computer to verify it can…

    • 804 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3

    • 3277 Words
    • 14 Pages

    It enables caller to leave voice messages. Also I can play back the left messages at any time until it’s deleted. It usually used when the business has a lot of calls and there is no available person to answer the calls. It often used at out of office hours as well.…

    • 3277 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    8. As a security professional, you have been asked to perform an intrusive penetration test which involves cracking into the organization’s WLAN for a company. While performing this task, you are able to retrieve the authentication key. Should you use this and continue testing, or stop here and report your findings to the client?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Iscm Strategic Plan

    • 1276 Words
    • 6 Pages

    To the extent possible, organizations should identify, report, and remediate vulnerabilities in a coordinated, organization-wide manner using automated vulnerability and patch management tools and technologies. Vulnerability scanners are commonly used in organizations to identify known vulnerabilities on hosts and networks and on commonly used operating systems and applications. These scanning tools can proactively identify vulnerabilities, provide a fast and easy way to measure exposure, identify out-of-date software versions, validate compliance with an organizational security policy, and generate alerts and reports about identified…

    • 1276 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    11. To show what an attacker would have access to if they were in the system.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    4. Did the static analysis tool find all the potential security flaws in the application?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    LAB 1 NMAP Exercise Answers

    • 3198 Words
    • 11 Pages

    Nmap was not able to classify the operating system (OS) running on all “3” hosts provided during the exercise. However, Nmap was able to identify and determine the OS running on “Host 1” as presented in Figure 1: Host 1 (192.168.100.103). Located in Nmap there is an attribute which is used to conjecture the OS of a target host. If an individual decides to limit the OS detection to the targets, one can use one open and one closed port by using the (osscan-limit) feature command. With this scan Nmap will attempt a (TCP-SYN) connection to 1000 of the most common ports as well as an ICMP echo request to determine if a host if up. On the other hand if Nmap cannot make a perfect match for an OS it will guess something that is close, but not 100% exact (Orebaugh & Pinkard, pp. 111, 2008). This approach is more aggressive and is called (osscan-guess).…

    • 3198 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    Penetration testing has been well popularized by the media. Many companies are now offering penetration services to identify vulnerabilities in systems and the surrounding processes. This report will Discuss "Penetration Testing" as a means of strengthening a corporate network's security. This report is divided into three parts. Introduction will give you a brief and basic overview of Penetration Testing and why we need Penetration Testing, The second part is the technical breakdown explains The strategy, model and type of Penetration Testing. In the conclusion, we will discuss both the value and limitation of Penetration Testing.…

    • 3406 Words
    • 14 Pages
    Powerful Essays