How many total ip hosts did zenmap find on the network

Assignment Help Computer Engineering
Reference no: EM131152972

Lab- Performing Reconnaissance and Probing Using Common Tools

Overview

In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart.

Lab Assessment Questions & Answers

1. Name at least five applications and tools used in the lab.

2. What is promiscuous mode?

3. How does Wireshark differ from NetWitness Investigator?

4. Why is it important to select the student interface in the Wireshark?

5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?

6. Name at least five different scans that may be performed with Zenmap.

7. How many different tests (i.e., scripts) did your Intense Scan perform?

8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report.

9. How many total IP hosts did Zenmap find on the network?

Reference no: EM131152972

Questions Cloud

Container of liquid laundry detergent : A container of liquid laundry detergent promises over 100 loads from the bottle. You sample 45 bottles and find a mean of 102 loads with a standard deviation of 3.75 loads. At the 0.01 level of significance, is the manufacturer's claim supported?
Development of the clients presentation : Investigate and outline the prevalence/incidence of depression AND suicide in Australia - Ensure your answer covers: gender, age groups. Specific risk groups. hospitalization and recovery.
Identify the first step in the student guide to research : Define the basic concepts used in the discipline of sociology. Define the various methodologies for sociological research. Use technology and information resources to research issues in sociology.
Conduct a hypothesis test : She randomly surveys 426 schoolmates and finds that 150 report they fear public speaking. Conduct a hypothesis test at the 5% level of significance to determine if the percent at her school is less than 40%
How many total ip hosts did zenmap find on the network : Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report. How many total IP hosts did Zenmap find on the network?
Describe agent of sociology that has changed during lifetime : Examine one (1) of the six (6) agents of socialization (family, school, peer groups, work, religion, and technology and mass media). Describe the agent of sociology that has changed the most during your lifetime and discuss the importance of this ..
Relationship between two variables : What does a y intercept tell you about the relationship between two variables?
Probability that a randomly selected electric bill : Problem: Monthly electric bills in a large city are normally distributed with a mean of $240 and a standard deviation of $45. What is the probability that a randomly selected electric bill has a value between $280 and $320?
Describe your organizational culture : Describe your organizational culture and -  its relationship with the chosen strategy. -  How effective is this relationship?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the largest value of x

A soft real-time system has four periodic events with periods of 50, 100, 200 and 250 msec each. assume four events require 35, 20, 10 and X msec of CPU time, respectively. What is the largest value of X for which the system is schedulable.

  Create a program generates a 3-digit random number 100 times

Write down a C# application that generates a 3-digit random number 100 times. Display the output for each of the generated numbers and the sum of all 100 numbers. Every 10th number you should display a String consisting of a any phrase of your cho..

  Mips single-cycle datapath processor

An instruction is being executed on the MIPS single-cycle datapath processor. Which class of instruction is being executed over the processor? b) Will you specify which instruction is being executing?

  Generates a random number in the range of 1

Write down a pseudocode statement that generates a random number in the range of 1 through 100 and assigns it to a variable named rand.

  Discuss software testing as a career path in brief

discuss software testing as a career path in brief. The techniques for solving linear equations and linear inequalities are similar, yet different. Explain and give an example of both a linear equation and a linear inequality that demonstrates this..

  Search for movies by movie name or kind of movie

Search for movies that have a certain actor (note that some movies will have more than one actor worth searching on). Search for customers by last name or phone number.

  Design an application that declares a purchase object

as you prompt for a sale amount, do not proceed until the user has entered a nonnegative value. After a valid urchase object has been created, display the objects invice number, sale amount, and sales tax.

  Weighted probabilities for x86 processorscreate a procedure

weighted probabilities for x86 processorscreate a procedure that receives a value n between 0 to 100. when the

  When interrupts are enabled

Which of the following for the 9S12G128 microcontroller cannot be configured to process an interrupt. For the 9S12G128 microcontroller, when the power-on reset is activated, who provided the ISR memory address for the Reset ISR

  Question1 add following 16-bit 2s complement numbers

question1 add following 16-bit 2s complement numbers represented in hex assume word size of computer is 16 bits - fe59

  How several 1024 x 768 color images will fit on a cd-rom

How several 1024 x 768 color images will fit on a CD-ROM?

  What is the corresponding key length in bits

What is the size of the key space which can be constructed by such passwords - What is the corresponding key length in bits?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd