Preview

IS3110 Lab 5

Good Essays
Open Document
Open Document
610 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 Lab 5
1. What are the differences between ZenMap GUI and Nessus?

NMAP is run most of the time on a host and port discovery, Nessus is usually installed on servers and takes it to the next level. It analyzes the ports and looks for potential security issues

2. Which scanning application is better for performing a network discovery Reconnaissance probing of an IP Network infrastructure? NMap

3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus

4. How many total scripts does the Intense Scan using ZenMap GUI perform? Runs 36 Scripts

5. From the Zen Map GUI pdf report page 6, who ports and services are enabled on the Cisco Security Appliance Device? 22 / TCP Open SSH Cisco SSH 1.25

6. What is the source IP address of the Cisco Security Appliance Device? 172.30.0.1

7. How many IP hosts were identified in the Nessus vulnerability Scan? Depends on the scan

Nine IP Addresses scanned, 49.39 seconds, 256 IP Addresses (5 hosts) scanned in 5433.44 Seconds

8. While Nessus provides suggestions for remediation steps, what else does Nessus provide that can help you assess the risk impact of the identified software vulnerability? It provides a way either through a patch or update that will allow you to repair that vulnerability
9. Are open ports necessarily a risk? Why or why not? An open port is only a risk if it is not supposed to be open. There are always ports that will need to be open , but ones that have no need to be open should be closed.
10. When you identify a known software vulnerability, where can you go to access the risk impact of the software vulnerability?
It’s located in the server section of the application, or a software icon

11. Specify what CVE-2009-3555 is and what the potential exploits are, and assess the severity of the vulnerability.
It is a list of what the potential exploits are and the severity of the vulnerability. It attempts to provide

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Use the scenarios in the Bugusa, Inc., link located on the student website to answer the following questions.…

    • 915 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    BUGusa

    • 285 Words
    • 2 Pages

    Use the scenarios in the Bugusa, Inc., link located on the student website to answer the following questions.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bugusa Case Study

    • 914 Words
    • 4 Pages

    Use the scenarios in the BUGusa, Inc., link located on the student website to answer the following questions.…

    • 914 Words
    • 4 Pages
    Good Essays
  • Better Essays

    BUGusa Inc. Worksheet

    • 1160 Words
    • 5 Pages

    Use the scenarios in the Bugusa, Inc., link located on the student website to answer the following questions.…

    • 1160 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.(1)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    6. The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe…

    • 440 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 251 Words
    • 2 Pages
    Satisfactory Essays