Preview

operating system

Good Essays
Open Document
Open Document
464 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
operating system
1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application.

Zenmap is an application that is used to scan ports for networks. A scenario where it can be used is to scan the ports of a network to know exactly which ports are opened or closed thus allowing a network administrator to reduce the vulnerability of its network.

2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?
Nessus.

3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?

One must obtain a signed authorization form showing exactly what kind of test you are authorized to perform.

4. What is a CVE listing? Who hosts and who sponsors the CVE database listing website?

CVE listing is a dictionary of publicly known information security vulnerabilities and exposures. IT is hosted by the Office of Cybersecurity and Communications at the U.S. Department of Homeland Security

5. Can Zenmap GUI detect which operating systems are present on IP servers and workstations? Which option includes that scan?

Yes, the OS detection using TCP/IP stack fingerprinting option includes that scan.

6. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus vulnerability assessment scan?
One can use this information to create a policy of vulnerabilities that you want Nessus to scan for on that specific host.

7. Once a vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk mitigation solution?

You can check the report generated by Nessus, specifically in the hostname plugin ID which will give you a detailed description of the vulnerability found along with possible mitigation

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MNP231

    • 1327 Words
    • 4 Pages

    2. What two basic methods capture an image of a Windows Server 2008 computer by using the tools you installed in this lab?…

    • 1327 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7) How does Nessus differ from ZeNmap GUI and which tool would you use for network discovery and inventory versus identifying software vulnerabilities?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    15) Which of the following defines the cycle used to address Windows threats and vulnerabilities? B) Discovery-analysis-remediation…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    A network operating system is a piece of software that is utilized to manage the network resources available to the clients on your network. As a central point of management you have the ability to create and manage user accounts, security templates(group policy), allow users and systems access to file servers and printers, and control any information that is requested from outside your network. Proper utilization and configuration of your network operating system is essential for the security of your network. From the server you can place rules on each of your clients to limit the resources they have access to, while determining how much freedom they will enjoy on their systems.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive os fingerprinting.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which…

    • 652 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking…

    • 838 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Refers to scanning a system for vulnerabilities and reveals information about the target that is needed to access it.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    4. Did the static analysis tool find all the potential security flaws in the application?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays