You will get email Reply within few hours

Tuesday, 19 March 2013

it 255 lab 2

1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application.

2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems security throughout the seven domains of a typical IT infrastructure?

3. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?
4. Before you conduct an ethical hacking process or penetration test on a live production network, what must you do prior to performing the reconnaissance, probing, and scanning procedures?
5. What is a CVE listing? Who hosts and who sponsors the CVE database listing website?
6. Can Zenmap GUI detect which operating systems are present on IP servers and workstations? What would that option look like in the command line if running a scan on 172.30.0.10?
7. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus vulnerability assessment scan?
8. Once a vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk mitigation solution?
9. What is the major difference between Zenmap GUI and Nessus?
10. Why do you need to run both Zenmap GUI and Nessus to perform the fi rst three steps of the hacking process?

Need Solution Click link:
https://gum.co/xpGF
          OR email me

topsolutions8@gmail.com