The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 305 Weeks Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Â
|
Cylindrical |
 |
|
Reproducible |
 |
|
Critical |
 |
|
Cyclical |
 |
Â
Â
|
Accept |
 |
|
Reduce |
 |
|
Mitigate |
 |
|
Negotiate |
 |
Â
Â
|
SOX |
 |
|
GLB |
 |
|
PCI |
 |
|
SDL |
 |
Â
Â
|
Identification |
 |
|
Compromise |
 |
|
Availability |
 |
|
Exploitation |
 |
Â
Â
|
California Civil Code 1798 |
 |
|
Protection and Rights Act (1998) |
 |
|
California Civil Code 1600 |
 |
|
California Civil Code 2010 |
 |
Â
Â
|
Market share |
 |
|
Sales goal |
 |
|
Insurance |
 |
|
Reputation |
 |
Â
Â
|
Conduct a thorough analysis of the organization's internet facing servers. |
 |
|
Use a public internet connection to perform your footprinting steps of the organization. |
 |
|
Get permission in writing to perform the audit or penetration test. |
 |
|
Run a scan against the company's firewalls to ensure that it is configured properly. |
 |
Â
Â
|
Alternative to FTP |
 |
|
Backup a website |
 |
|
Copy a website HTML code |
 |
|
Secure a website |
 |
Â
Â
|
VIAM |
 |
|
FINDER |
 |
|
EDGAR |
 |
|
ICANN |
 |
Â
Â
|
Internet domain names |
 |
|
Port numbers |
 |
|
IP addresses |
 |
|
MAC addresses |
 |
Â
Â
|
APNIC |
 |
|
RIPE |
 |
|
LACNIC |
 |
|
ARIN |
 |
Â
Â
|
SSH |
 |
|
ICMP |
 |
|
DNS |
 |
|
TCP |
 |
Â
Â
|
Contributing Role |
 |
|
Operational Role |
 |
|
Vulnerability Role |
 |
|
Restructuring Role |
 |
Â
Â
|
Concept |
 |
|
Policy |
 |
|
Design |
 |
|
Charter |
 |
Â
Â
|
Compliance Manager |
 |
|
Vulnerability Manager |
 |
|
Change Manager |
 |
|
Incident Manager |
 |
Â
Â
|
Current operations documentation |
 |
|
VM policies |
 |
|
Scan results |
 |
|
Process documentation |
 |
Â
Â
|
Check for power on each machine. |
 |
|
Use netcat to connect to the servders through port 458. |
 |
|
Ask the target site through social engineering tactics which IP's are active fore their associated network ranges. |
 |
|
Run a ping sweep of the network. |
 |
Â
Â
|
DNS |
 |
|
TCP |
 |
|
ICMP |
 |
|
ARP |
 |
Â
Â
|
Analyzing warning banners. |
 |
|
Verifying copyright notices. |
 |
|
Connecting to remote services and observing output. |
 |
|
Verifying hardware cautions. |
 |
Â
Â
|
It does not interact with the network to discover hosts and vulnerabilities. |
 |
|
Discovery is continuous. |
 |
|
Limited visibility into vulnerabilities. |
 |
|
Little to no testing is required. |
 |
Â
Â
|
Highly Scalable |
 |
|
Can provide incremental information regardless of platform support |
 |
|
Potentially support any network device |
 |
|
Targets have to be on the network or they are not scanned |
 |
Â
Â
|
Polling |
 |
|
Reverse polling |
 |
|
On-demand connection |
 |
|
Tokens |
 |
Â
Â
|
They may conflict with other applications. |
 |
|
They cannot be used on imbedded systems. |
 |
|
They do not operate over the network. |
 |
|
They may not have sufficient privileges. |
 |
Â
Â
|
Active Directory |
 |
|
Passwd File |
 |
|
Security Accounts Manager |
 |
|
Domain Controllet |
 |
Â
Â
|
SAM |
 |
|
NFS |
 |
|
HOME |
 |
|
Shadow |
 |
Â
Â
|
netcat |
 |
|
ICMP |
 |
|
DNSsniffer |
 |
|
ARPreader |
 |
Â
Â
|
Accurately Detect Vulnerabilities |
 |
|
Report Progress |
 |
|
Track Remediation Status |
 |
|
Exploiting Vulnerabilities |
 |
Â
Â
|
Detect |
 |
|
Exploit |
 |
|
Remediate |
 |
|
Analyze |
 |
Â
Â
|
Evaluate the scope |
 |
|
Assign responsibilities for scanner process |
 |
|
Develop a deployment policy |
 |
|
Select a central location to which all scanners will report |
 |
Â
Â
|
Install on active workstations |
 |
|
Install agents on domain controllers |
 |
|
Install agents on all devices in a network |
 |
|
Change rights and privileges of agents |
 |
Â
Â
|
True |
 |
|
False |
 |
Â
Â
|
arp |
 |
|
getadmin |
 |
|
CAIN |
 |
|
pwdump |
 |
Â
Â
|
passwd |
 |
|
Active Directory |
 |
|
SAM |
 |
|
shadow |
 |
Â
Â
Assignment Objectives
Other Information
There is no additional information to display at this time.
Â
Legend
Collapse All | Expand All Collapse All | Expand All
Assignment Details
Assignment Description
Â
|
Cylindrical |
 |
|
Reproducible |
 |
|
Critical |
 |
|
Cyclical |
 |
Â
Â
|
Accept |
 |
|
Reduce |
 |
|
Mitigate |
 |
|
Negotiate |
 |
Â
Â
|
SOX |
 |
|
GLB |
 |
|
PCI |
 |
|
SDL |
 |
Â
Â
|
Identification |
 |
|
Compromise |
 |
|
Availability |
 |
|
Exploitation |
 |
Â
Â
|
California Civil Code 1798 |
 |
|
Protection and Rights Act (1998) |
 |
|
California Civil Code 1600 |
 |
|
California Civil Code 2010 |
 |
Â
Â
|
Market share |
 |
|
Sales goal |
 |
|
Insurance |
 |
|
Reputation |
 |
Â
Â
|
Conduct a thorough analysis of the organization's internet facing servers. |
 |
|
Use a public internet connection to perform your footprinting steps of the organization. |
 |
|
Get permission in writing to perform the audit or penetration test. |
 |
|
Run a scan against the company's firewalls to ensure that it is configured properly. |
 |
Â
Â
|
Alternative to FTP |
 |
|
Backup a website |
 |
|
Copy a website HTML code |
 |
|
Secure a website |
 |
Â
Â
|
VIAM |
 |
|
FINDER |
 |
|
EDGAR |
 |
|
ICANN |
 |
Â
Â
|
Internet domain names |
 |
|
Port numbers |
 |
|
IP addresses |
 |
|
MAC addresses |
 |
Â
Â
|
APNIC |
 |
|
RIPE |
 |
|
LACNIC |
 |
|
ARIN |
 |
Â
Â
|
SSH |
 |
|
ICMP |
 |
|
DNS |
 |
|
TCP |
 |
Â
Â
|
Contributing Role |
 |
|
Operational Role |
 |
|
Vulnerability Role |
 |
|
Restructuring Role |
 |
Â
Â
|
Concept |
 |
|
Policy |
 |
|
Design |
 |
|
Charter |
 |
Â
Â
|
Compliance Manager |
 |
|
Vulnerability Manager |
 |
|
Change Manager |
 |
|
Incident Manager |
 |
Â
Â
|
Current operations documentation |
 |
|
VM policies |
 |
|
Scan results |
 |
|
Process documentation |
 |
Â
Â
|
Check for power on each machine. |
 |
|
Use netcat to connect to the servders through port 458. |
 |
|
Ask the target site through social engineering tactics which IP's are active fore their associated network ranges. |
 |
|
Run a ping sweep of the network. |
 |
Â
Â
|
DNS |
 |
|
TCP |
 |
|
ICMP |
 |
|
ARP |
 |
Â
Â
|
Analyzing warning banners. |
 |
|
Verifying copyright notices. |
 |
|
Connecting to remote services and observing output. |
 |
|
Verifying hardware cautions. |
 |
Â
Â
|
It does not interact with the network to discover hosts and vulnerabilities. |
 |
|
Discovery is continuous. |
 |
|
Limited visibility into vulnerabilities. |
 |
|
Little to no testing is required. |
 |
Â
Â
|
Highly Scalable |
 |
|
Can provide incremental information regardless of platform support |
 |
|
Potentially support any network device |
 |
|
Targets have to be on the network or they are not scanned |
 |
Â
Â
|
Polling |
 |
|
Reverse polling |
 |
|
On-demand connection |
 |
|
Tokens |
 |
Â
Â
|
They may conflict with other applications. |
 |
|
They cannot be used on imbedded systems. |
 |
|
They do not operate over the network. |
 |
|
They may not have sufficient privileges. |
 |
Â
Â
|
Active Directory |
 |
|
Passwd File |
 |
|
Security Accounts Manager |
 |
|
Domain Controllet |
 |
Â
Â
|
SAM |
 |
|
NFS |
 |
|
HOME |
 |
|
Shadow |
 |
Â
Â
|
netcat |
 |
|
ICMP |
 |
|
DNSsniffer |
 |
|
ARPreader |
 |
Â
Â
|
Accurately Detect Vulnerabilities |
 |
|
Report Progress |
 |
|
Track Remediation Status |
 |
|
Exploiting Vulnerabilities |
 |
Â
Â
|
Detect |
 |
|
Exploit |
 |
|
Remediate |
 |
|
Analyze |
 |
Â
Â
|
Evaluate the scope |
 |
|
Assign responsibilities for scanner process |
 |
|
Develop a deployment policy |
 |
|
Select a central location to which all scanners will report |
 |
Â
Â
|
Install on active workstations |
 |
|
Install agents on domain controllers |
 |
|
Install agents on all devices in a network |
 |
|
Change rights and privileges of agents |
 |
Â
Â
|
True |
 |
|
False |
 |
Â
Â
|
arp |
 |
|
getadmin |
 |
|
CAIN |
 |
|
pwdump |
 |
Â
Â
|
passwd |
 |
|
Active Directory |
 |
|
SAM |
 |
|
shadow |
 |
Â
Â
Assignment Objectives
Other Information
There is no additional information to display at this time.
Â
Legend
© 2017 Colorado Technical University - Colorado Springs.
  All Rights Reserved. Authorized Users Only.
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly