1. ZenMap GUI sends out broadcasts for server queries for various different types of operating systems in servers (OS). By examining how various hosts respond to certain queries, ZenMap GUI can distinguish what kind of OS and server exists.
2. Nmap searches its internal database and what ports on the IP’s are listening and matches it to the best known application. Applications like MSSQL and Web servers usually use the same ports over and again For example tcp port 3389 will most definitely show Microsoft Remote Desktop application listening for incoming connections by default. This is not a very reliable form of identifying services because any service can manually be started on a well-known port number invalidating Nmap’s list of commonly used ports.
3. Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems.
4. Nessus® provides useful and up to date software vulnerability assessment and suggested remediation plans via updates and plug-ins. Nessus® can help security practitioners with shrinking the software vulnerability window with up to date software patching and security updates.Nmap (ZeNmap GUI) provides security practitioners with an easy to use, automated network discovery and inventory management tool. Nmap can provide a quick reconnaissance and prove of an IP network infrastructure and allows for more targeted software vulnerability scans performed by Nessus®.
5. The Policy definition defines the parameters and operations of the vulnerability scan. This is like the configuration parameters of the scan itself.
6. * Name – Sets the name that will be displayed in the Nessus® UI to identify the scan.
* Type – Choose between “Run Now” (immediately execute the scan after submitting) o
“Template” (Save as a template for future repeat scanning)
* Policy – Select a previously created policy