ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 25 May 2017 My Price 8.00

Nmap commands within the Zenmap application

need help on this

In this lab, you used Nmap commands within the Zenmap application to scan the virtual network 
and identify the devices on the network and the operating systems and services running on them. 
You also used OpenVAS to conduct a vulnerability assessment and record the high risk 
vulnerabilities identified by the tool. Finally, you used the information you gathered from the 
report to discover mitigations for those risks and make mitigation recommendations based on 
your findings.  
Lab Assessment Questions & Answers 
1.What is Zenmap typically used for? How is it 
related to Nmap? Describe a scenario in which 
you would use this type of application. 
2.Which application can be used to perform a vulnerability assessment scan in the 
reconnaissance phase of the ethical hacking process? 
3.What must you obtain before you begin the ethical
 hacking process or penetration test on a live 
production network, even before performing the reconnaissance step? 
4.What is a CVE listing? Who hosts and who 
sponsors the CVE database listing Web site? 
5.Can Zenmap detect which operating systems are present on IP servers and workstations? 
Which option includes that scan? 
6.How can you limit the breadth and scope of a vulnerability scan? 
7.Once a vulnerability has been identified by 
OpenVAS, where would you check for more 
information regarding the identified vulnerability, exploits, and any risk mitigation solution? 
8.What is the major difference between Zenmap and OpenVAS? 
9.Why do you need to run both tools like Zenmap and OpenVAS to complete the reconnaissance 
phase of the ethical hacking process? 

Answers

(11)
Status NEW Posted 25 May 2017 04:05 AM My Price 8.00

-----------

Attachments

file 1495687134-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)