Review the network structure

Assignment Help Computer Networking
Reference no: EM13765603

Now that you have an understanding about how the organization is set up (with respect to the network and system infrastructures), it is time to fill in the details and see what actually exists and what attack vectors are present. This assignment will have you review the network structure and identify the machines, including operating systems and running services on each. You will scan and enumerate the system in your organization.

Using a scanning and enumeration tool, identified or chosen and then installed from the Unit 3 Discussion Board, perform a scan against your home/personal machine or network, and supply the following information about your organization:

  • A description about the tool used to perform the scan
  • A list of identified target host(s) in your lab environment
  • What running services are detected on each (include version numbers if possible)
  • What the detected operating system of the servers is
  • Describe or list any information that you found odd or that you think the tool reported incorrectly.

Reference no: EM13765603

Questions Cloud

Explain what makes app inventor different to other apps ide : Explain what makes App Inventor different to other mobile apps IDE such as Xcode for iOS, Eclipse for Android and Visual Studio for Windows Phone? State clearly the advantages and disadvantages of App Inventor.
Different tools or sites : Describe at least 5 different tools or sites used during footprinting.
Importance of informed financial decisions : Create a matrix identifying the roles, expenditures, and revenue for the federal, state, and local levels of government. Importance of informed financial decisions
Specify the limits of the agency budget office : Specify the limits of the agency budget office and how they may try to compensate for those limits. What strategies might agencies and politicians use to justify increasing or decreasing the budget for the program you selected
Review the network structure : Now that you have an understanding about how the organization is set up (with respect to the network and system infrastructures), it is time to fill in the details and see what actually exists and what attack vectors are present.
The constraints on monetary policy impact : Howe interest rates are set in the money market and - How monetary policy affects macro outcomes and The constraints on monetary policy impact
Explain the definition of microagression : Explain the definition of microagression. Any experience you have had as the recipient of microagressions. How your understanding of prejudice, stereotyping, and discrimination has changed
Paper on race and gender in policing : Write 4-6 Page Paper on race and gender in policing
How the federal reserve is organized : How the Federal Reserve is organized and the Fed's major policy tools.

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss the tools that you want to put in place immediately

You've just taken a position as a network administrator for an 80-person company, and you are the only network administrator there. On the surface, it looks like everything has been working fine in the three months since the previous network admin..

  Networking solution - wan communications between sites

The management team would like a networking solution which would offer easier troubleshooting, less down time, and WAN Communications between sites. They would like t he WAN Connections to support 256 Kbps of data and several telephone conversatio..

  Beyond the literal meaning write down the broader

beyond its literal meaning what are the broader implications of the clicheacute keeping the family name alive? or has

  Explain three 3 ways in which businesses use internet

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  Research a metro ethernet service

Research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn't have Metro Ethernet).

  Determining size of ethernet mac addresses

Determine the size of Ethernet MAC addresses?

  List host addresses

Subnet the following address - 130.4.8.74 The goal is to subnet the above address and to produce 7 subnets and 350 hosts/subnet. Please show all of your work. I am looking for the following: 1. List Custom Subnet Mask 2. List Network Addresses 3. ..

  What are the benefits of cloud computing adoption

What are the key organisational and environmental factors that influence SMEs to adopt Cloud based services?

  Part- aduring the labs we used the national vulnerability

part- aduring the labs we used the national vulnerability database. select a recent vulnerability from that database

  Identify need or opportunity that prompted decision

Locate two such organizations. For each of the two, identify the need or opportunity that prompted the decision to have a physical presence.

  Describe the differences in physical layer and data-link

question 1 describe what a teleworker or telecommuter is as it relates to a working environment. also how does a

  What else is needed to replace the pbx

In addition to Internet phone software and the interface in Part b (above) what else is needed to replace the PBX?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd