Who hosts and sponsors the cve database listing web site

Assignment Help Computer Networking
Reference no: EM131143670

Lab- Assessment Worksheet Performing a Vulnerability Assessment

Overview

In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings.

Lab Assessment Questions & Answers

1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application.

2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical hacking process?

3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?

4. What is a CVE listing? Who hosts and sponsors the CVE database listing Web site?

5. Can Zenmap detect which operating systems are present on IP servers and workstations? Which option includes that scan?

6. How can you limit the breadth and scope of a vulnerability scan?

7. Once a vulnerability has been identified by OpenVAS, where would you check for more information regarding the identified vulnerability, exploits, and any risk mitigation solution?

8. What is the major difference between Zenmap and OpenVAS?

9. Why do you need to run both tools like Zenmap and OpenVAS to complete the reconnaissance phase of the ethical hacking process?

Reference no: EM131143670

Questions Cloud

Recommend upper management consider for bruce project : Bruce’s website development project is nearing an end, and upper management must decide what to do with the resources associated with the project. Bruce’s team met all schedule and expenditure goals, but the product they produced (a video-swapping on..
Effective systems in place to track work-effort-expenditures : Your organization has effective systems in place to track work-effort and expenditures, but needs to do a better job at monitoring quality. How can Six Sigma be beneficial for an IT project?
Determine the correlation coefficient. comment on the value : Determine the correlation coefficient. Comment on the value of the correlation coefficient. Find the predicted value of Y given X = 75. Give an interpretation of the predicted value in the context of the problem.
The intangible assets section of time company at december : The intangible assets section of Time Company at December 31, 2010, is presented below.
Who hosts and sponsors the cve database listing web site : What is a CVE listing? Who hosts and sponsors the CVE database listing Web site? Can Zenmap detect which operating systems are present on IP servers and workstations? Which option includes that scan?
What is the difference between flow stock and concentration : What is the difference between flow, stock, and concentration statistics? How is each type of statistic used?
It was scrapped as having no value : Bobby's has delivery equipment that cost $40,000 and that has been depreciated $26,000. Record the disposal under the following assumptions.
Create research problem on health wellness and technology : create and clarify a research problem or research question for each of the following topics: - Health and Wellness, -Technology -  Economy.
What are the changes in the local geodetic coordinates : If the slant distance between two stations is 843.273 m, the zenith angle between them is 85°58'44" and the azimuth of the line is 312°23' 59", what are the changes in the local geodetic coordinates?

Reviews

Write a Review

Computer Networking Questions & Answers

  Prepare a budget for the whole project

Prepare a budget for the whole project in terms of the cost of procurement, deployment, man power, scalability, security etc and prepare a time line which will serve as a guideline for you and your client.

  Connecting computers in a local area network

Assume you are asked to head a non computerized department and you need ten computers and would like to connect them to each other.

  Compare and contrast cisco systems physical security program

Compare and contrast Cisco Systems' physical security program with one of the researched organization's physical security program.

  Describe the protocols and functions of each layer in detail

ISO/OSI Network Reference Model- Define and explain the model including the seven layers for the ISO/OSI Network Reference Model. Describe the protocols and functions of each layer in detail

  Create communication system for transmission

Create communication system (block diagram) which will permit transmission of these 4 sources over  telephone channel using: Time division multiplexing by using PCM, suppose 8-bit samples.

  Describe the hardware you will purchase

Describe the hardware you will purchase or build (inclusive of computers, memory, storage, video cards, printers, routers and cabling). Justify your hardware selection

  Hit rate and miss penalty

HIT RATE AND MISS PENALTY PROBLEM Consider a 2 level cache with access time of 5 ns and 80 ns respectively. If hit rate are 95% and 75% respectively and memory access time is 250 ns, what is average access time?

  Describe the open systems interconnection protocol model

Describe the Open Systems Interconnection (OSI) protocol model and Identify major protocols for circuit switching and packet switching

  Devices and type of network circuits used in network

Include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way.

  What is the network class of the address

What is the URL name and dotted quad IP address of an Internet URL that you use? (It could be your ISP)and What is the Network Class of the address

  Capture the traffic between a domain client and its server

Using a network sniffer, capture the traffic between a domain client and its server during the logon process. Determine if the username and password are encrypted during this process.

  1 the scenarioyou have been asked to prepare a feasibility

1. the scenarioyou have been asked to prepare a feasibility study and an initial design to enable a large holiday

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd