Preview

Title

Satisfactory Essays
Open Document
Open Document
309 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Title
1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application. / Scanning all domains within the local domain. / If I was a financial accountant, I would use this to see what my employees are accessing and who is doing what on the company internet. I would like to find out who is compromising their privileges and accessing inappropriate sites.

2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? / They all affect security and integrity of a network domain local.

3. Which application is used in step #2 in the hacking process to perform a vulnerability assessment scan? / Nessus

4. Before you conduct an ethical hacking process or penetration test in a live production network, what must you do prior to performing the reconnaissance and probing and scanning procedures? / Perform an IP host discovery and port intense scan

5. What is a CVE listing? Who hosts and who sponsors the CVE database listing website? / A system that provides a record for publicly know ISS vulnerability / The public

6. Can ZenMap GUI detect what operating systems are present on IP servers and Workstations? What would that option look like in the command line if running a scan on 172.30.0.10? / Yes / It would be the green text in the command line

7. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus Vulnerability assessment scan? / You need to select Windows Credentials in the drop down menu next to credential type.

8. Once vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4) Explain both the information systems security practitioner and hacker perspectives of using a security scanning application such as Nessus.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    Zenmap sends discreet packets of data to the host computer and asks for a response. When it gets that response it can hopefully determine what OS is on that computer by the data that was sent back.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    4. Which of the following is a detailed written definition of how software and hardware are to be used? (Page 40)…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    is3110 lab 5

    • 1037 Words
    • 5 Pages

    3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? The annual SANS Top 20 classifies most of these dangerous holes for both Windows and Unix, and prescribes best practices for patching and remediation. Also, the SANS Top 20 arranges vulnerabilities into 10 classes for each platform with categories of vulnerabilities within them.…

    • 1037 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    4 As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    4. What is a CVE listing? Who hosts and who sponsors the CVE database listing website?…

    • 464 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    LAB 1 NMAP Exercise Answers

    • 3198 Words
    • 11 Pages

    Nmap was not able to classify the operating system (OS) running on all “3” hosts provided during the exercise. However, Nmap was able to identify and determine the OS running on “Host 1” as presented in Figure 1: Host 1 (192.168.100.103). Located in Nmap there is an attribute which is used to conjecture the OS of a target host. If an individual decides to limit the OS detection to the targets, one can use one open and one closed port by using the (osscan-limit) feature command. With this scan Nmap will attempt a (TCP-SYN) connection to 1000 of the most common ports as well as an ICMP echo request to determine if a host if up. On the other hand if Nmap cannot make a perfect match for an OS it will guess something that is close, but not 100% exact (Orebaugh & Pinkard, pp. 111, 2008). This approach is more aggressive and is called (osscan-guess).…

    • 3198 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script…

    • 251 Words
    • 2 Pages
    Satisfactory Essays