How many total ip hosts did zenmap find on the network

Assignment Help Computer Engineering
Reference no: EM131152972

Lab- Performing Reconnaissance and Probing Using Common Tools

Overview

In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart.

Lab Assessment Questions & Answers

1. Name at least five applications and tools used in the lab.

2. What is promiscuous mode?

3. How does Wireshark differ from NetWitness Investigator?

4. Why is it important to select the student interface in the Wireshark?

5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?

6. Name at least five different scans that may be performed with Zenmap.

7. How many different tests (i.e., scripts) did your Intense Scan perform?

8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report.

9. How many total IP hosts did Zenmap find on the network?

Reference no: EM131152972

Questions Cloud

Container of liquid laundry detergent : A container of liquid laundry detergent promises over 100 loads from the bottle. You sample 45 bottles and find a mean of 102 loads with a standard deviation of 3.75 loads. At the 0.01 level of significance, is the manufacturer's claim supported?
Development of the clients presentation : Investigate and outline the prevalence/incidence of depression AND suicide in Australia - Ensure your answer covers: gender, age groups. Specific risk groups. hospitalization and recovery.
Identify the first step in the student guide to research : Define the basic concepts used in the discipline of sociology. Define the various methodologies for sociological research. Use technology and information resources to research issues in sociology.
Conduct a hypothesis test : She randomly surveys 426 schoolmates and finds that 150 report they fear public speaking. Conduct a hypothesis test at the 5% level of significance to determine if the percent at her school is less than 40%
How many total ip hosts did zenmap find on the network : Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report. How many total IP hosts did Zenmap find on the network?
Describe agent of sociology that has changed during lifetime : Examine one (1) of the six (6) agents of socialization (family, school, peer groups, work, religion, and technology and mass media). Describe the agent of sociology that has changed the most during your lifetime and discuss the importance of this ..
Relationship between two variables : What does a y intercept tell you about the relationship between two variables?
Probability that a randomly selected electric bill : Problem: Monthly electric bills in a large city are normally distributed with a mean of $240 and a standard deviation of $45. What is the probability that a randomly selected electric bill has a value between $280 and $320?
Describe your organizational culture : Describe your organizational culture and -  its relationship with the chosen strategy. -  How effective is this relationship?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd