Preview

Lab 8 for Network Security, Firewalls and VPNs

Satisfactory Essays
Open Document
Open Document
486 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 8 for Network Security, Firewalls and VPNs
Lab 4
1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?
2) What is the purpose of defining a Policy definition as a first step in performing a Nessus vulnerability scan?
a. Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is a policy definition of it. IT is a free program that can be downloaded but donations are accepted. IT is also an open source program so people are constantly improving it.
3) What five things can you configure as part of a vulnerability scan?
i. You can configure:
1. Data Leakage
2. Compliance priority
3. Users
4. Scan options
5. Plugins
4) Explain both the information systems security practitioner and hacker perspectives of using a security scanning application such as Nessus.
a. Vulnerability scans performed from external hosted servers give the same perspective as an attacker. Two types of hacking are White hats which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. Black Hats are individuals that break into systems or networks that are not authorized to.
5) How many tests does the Nessus Lab #4 Server Farm Scan perform?
a. 6
6) Describe what each of these test display withing the Scan Report Details.
a. The test include the severity from high, medium or low. Scans and test also include, parameters that control technical aspects, timeouts, number of host, type of port scanner, policy checks, service detection scan settings, UNIX compliances and many other checks that can give vulnerabilities.
7) How does Nessus differ from ZeNmap GUI and which tool would you use for network discovery and inventory versus identifying software vulnerabilities?
8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?
a. 261
9) Did the targeted

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    5. The Policy definition defines the parameters and operations of the vulnerability scan. This is like the configuration parameters of the scan itself.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Section 1Computing Usable Subnets and Hosts vLab—40 Points Total * Task 1 * Task 2 * Summary Paragraph…

    • 1560 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Answer: 1. Nessus is typically port scanner tool which considered open port to check security vulnerabilities whereas Nmap is purely host detection and port discovery tool.…

    • 692 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Security Site Survey

    • 1000 Words
    • 4 Pages

    There are three labs supporting the Electronics programs: averaging 21 seats. There is one Network Lab designed to support individual networks with a capacity of 18 positions. The remaining labs support the Computer…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Summary of the Server, Events, Services, Object & Features to be tested and desired outcomes…

    • 5702 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Hacking Research Paper

    • 1380 Words
    • 6 Pages

    According to an article in Whatis.com, hackers primarily come in different shades or colors. The article goes on to say that these colors are significant in determining what kind of hacker he/she is. The lighter the color, the less harm a hacker intends. For example, a hacker with good intent and moral standing is called a white hat hacker. Another point made in the article was that the word “hat” after the color of the hacker is meant to be symbolic of old Western movies where the hero always wore a white hat and “bad guys” wore the black hats (Whatis.com). Black hat hackers, as you may have guessed, are the hackers who do intend harm. They deface websites, steal data, and exploit security flaws for personal gain. Black hats are sometimes called “crackers” as well because they crack programs and passwords to gain entry into a location where they are unauthorized to be (morebusiness.com). There are also hackers who are referred to as gray hat hackers. These are the hackers who have ethics, know what’s…

    • 1380 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Software License Agreement

    • 3405 Words
    • 14 Pages

    In consideration of access to the source code and the rights to copy, modify and redistribute granted by the license, users are provided only with a limited warranty and the software's author, the holder of the economic rights, and the…

    • 3405 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    first I want to say that there is an immense difference between coding, white hat hacking, and black hat hacking. The differences between these three is that coding is a programmer with limited experience who writes simple programs like on scratch, however, a coder can also be referred to a very experienced programmer like Dennis Ritchie or Linus Torvalds, a black hat hacker is a person with computer knowledge and is trying…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    During performance testing the performance leads/analyst need to analyze the results of the test and provide the details to the team/management. This is a repetitive thing…

    • 983 Words
    • 4 Pages
    Powerful Essays