Menu

Nmap report

0 Comment

3. Review the Lab 5 Nmap Scan Report that accompanies this lab.4. Using the Lab 5 Nmap Scan Report, answer the following questions: What are the date and timestamp of the Nmap host scan? What is the total number of loaded scripts for scanning? A synchronize packet (SYN) stealth scan discovers all open ports on the targeted host.How many ports are open on the targeted host for the SYN stealth scan at 13:36? Identify hosts, operating systems, services, applications, and open ports on devices from the Zenmap GUI (Nmap) scan report.5. Review the Lab 5 Nessus Vulnerability Scan Report that accompanies this lab.6. Using the Lab 5 Nessus Vulnerability Scan Report, answer the following questions: How many hosts were scanned? What were the start and end times for each of the scans? How many total vulnerabilities were discovered for each host? How many of the vulnerabilities were critical, major, and minor software vulnerabilities?7. On your local computer, open a new Internet browser window.8. In the address box of your Internet browser, type the URL http://cve.mitre.org and pressEnter to open the Web site.9. On the Web site, toward the top left of the screen, click the CVE List link.10. Review the CVE List Main Page.11. Define CVE.12. On the right, under Items of Interest, click the Terminology link.13. Review the definitions for vulnerability and exposure.14. Define the terms vulnerability and exposure.15. At the top right of the Web site, click the Search link.16. In the Search box, type the words Microsoft® XP 2003 Service Pack 1 and click the Search button.17. Describe some of the results you discover.18. After viewing the results, conduct another search and this time, type the words Cisco ASA5505 Security and click the Search button.19. Describe some of the search results.Lab5NessusVulnerabilityScanReport.pdfLab5NmapScanReport.pdfLab5NessusVulnerab04.pdfLab5Assignment1.docxLab5Assignment1.pdfPosted: 30 minutes agoDue: 10/01/2020Budget: $5Tags: urgent Answers 0Bids 48Great-WritersDr Ava_MiaMath GuruuProf BerrySasha SpencerRanchoddas Chanchad PhDRESPECT WRITERHomework ProRosie SeptemberRasWriterDr shamille ClaraMusyokionesPaula Hoguniversity workhassan0906Dr Candice_2547ansRohanprof avrilsmart-tutorChrisProfbrilliant answersEmily MichaelWendy LewisDrNicNgaosarapaul2013DexterMastersMiss ProfessorProf.MacQueenDr. Elahikim woodsRey writerperfectoEva GreenCasey CeliaCallie ThornetutorthammyTerry Robertskatetutorphyllis youngLiza_JulietElprofessoriSaad FahimSaburBQuickMentorA SolutionsQueenUnique_Profjudge mikeTopAcademicTutorOther questions 10satistics concepts Case Study 5BAM402 unit 2 examManaging peoplen/aAnalyze Whitman's Emorsonian ideas American identity and self-reliance. Strategic Management and Socially Conscious Organization Presentation Finance HW Individual White Paper: Wk 5 AssignmentNot ratedAssignment 7Part 1 (1 page): A four-paragraph executive summary written to executive management providing a summary of findings, risk impact to the IT asset and organization, and recommendations for next steps. …Not ratedInformation SecurityI WANT QUALITY WORK, THIS SHOULD BE DONE BY 2.00 AS PER CST TIME.Not rated3 paragraphs executive summary (1page or more – 375words)I have another assignment that need help. Please read the attached files and help me to write 3 paragraphs executive summary to executive management providing a summary of findings, risk impact …Not ratedNmap report3. Review the Lab 5 Nmap Scan Report that accompanies this lab.4. Using the Lab 5 Nmap Scan Report, answer the following questions: What are the date and timestamp of the Nmap host scan? What is …Not ratedLab 5Assignment InstructionsPlease complete Lab #5 in the Student Lab Manual. Per the student lab manual, your action items are as follows:Deliverables Upon completion of Lab #5 – Identify Risks, …Not ratedRisk Management Lab HomeworkPlease review all that is attached and following instructions in the attached word document.Due in 48 hours.10/01/20205computerscience