SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 2 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 21 Nov 2017 My Price 10.00

Threats & Vulnerabilities in an IT Infrastructure Using ZeNmap

Upon completion of Lab #5 – Identify Risks, Threats & Vulnerabilities in an IT Infrastructure Using ZeNmap GUI (Nmap) & Nessus® Reports, students are required to provide the following deliverables as part of this lab:

 

1. Lab #5 – A four-paragraph executive summary written to executive management providing a

summary of findings, risk impact to the IT asset and organization, and recommendations for next

steps.

 

 

Recommended Procedures

Lab #5 – Student Steps:

Student steps needed to perform Lab #5 – Identify Threats & Vulnerabilities in an IT Infrastructure Using

ZeNmap GUI (Nmap) & Nessus Reports:

1. Connect your removable hard drive or USB hard drive to a classroom workstation.

2. Boot up your classroom workstation and DHCP for an IP host address.

3. Login to your classroom workstation and enable Microsoft Word.

4. Review Figure 1 – Seven Domains of a Typical IT Infrastructure.

5. Load your workstation’s browser and go to: http://cve.mitre.org/ .

6. Familiarize yourself with the CVE listing and search engine tool.

• Load sample search criteria: “Microsoft XP 2003 Service Pack 1”, “Cisco ASA 5505

Security +”, etc.

7. Review the ZeNmap GUI (Nmap) network discovery and vulnerability assessment scan report

and identify the following:

• What was the date and time stamp of the Nmap host scan?

• How many total tests or scripts ran during the scan?

• A SYN stealth scan discovers all open ports on the targeted host. How many ports are open

on the targeted host?

• What ports are open on the targeted host?

• What services/applications are on the targeted host?

• What is the MAC layer address of the targeted host?

• What OS is loaded on the targeted host?

• How many router hops away is the targeted host?

• Does the ZeNmap GUI (Nmap) scan report provide any information regarding to risk, threats,

or vulnerabilities found?

• What must you do to confirm or verify if the identified OS, software, application has the

latest release and/or software updates and patches?

8. Review the Nessus vulnerability assessment scan report and identify the following:

• What was the date and time stamp of the Nessus host scan?

• How many total vulnerabilities were found per host?

• Of these vulnerabilities, how many were open ports, high, medium, or low criticality

vulnerabilities?

• What specific information was obtained regarding the targeted host:

o Name:

o Operating System:

• Does the Nessus vulnerability assessment scan report provide any information regarding to

risk, threats, or vulnerabilities found?

• What must you do to confirm or verify if the identified OS, software, application has the

latest release and/or software updates and patches?

Attachments:

Answers

(5)
Status NEW Posted 21 Nov 2017 02:11 PM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)