Describe the features and basic use of nessus

Assignment Help Basic Computer Science
Reference no: EM133214259

You are the security administrator for company ABC. You have been tasked to conduct a vulnerability study on the company network (use your home private network as the company network).

Use Nessus to scan your network and all hosts on your private network.

a. Describe the features and basic use of Nessus.

b. What did your final report contain?

c. Did you find vulnerabilities? If so, what is your plan to address those vulnerabilities (be specific). If the scan shows a specific host with a vulnerability you must detail what you will do to fix it.

d. How can Nessus be used in the field?

Ensure that you reference your sources in your post!

Reference no: EM133214259

Questions Cloud

World of cryptography is enormous : The world of cryptography is enormous. Reflect on what you learned this week. Sharing will help solidify your knowledge and introduce you to other perspectives.
Describe scenario that requires information security plan : Describe the scenario that requires an information security plan. The company you choose can be a current, former, or fictional environment.
Describe an industry in which you want to work : Describe an industry in which you want to work. In your opinion, which of the three primary stakeholder groups is the most powerful in that industry today? Why?
Asymmetric encryption algorithms and digital certificates : A public key infrastructure (PKI) system uses symmetric and asymmetric encryption algorithms and digital certificates to provide security for multiple applicati
Describe the features and basic use of nessus : You are the security administrator for company ABC. You have been tasked to conduct a vulnerability study on the company network (use your home private network
Draw a state transition diagram of the system : Consider the following four-step communication protocol, which is known as Kerberos protocol and its aim is to guarantee authentication and key exchange between
Identify an existing business : For each Organizational Behavior Model, identify an existing business that you think is a best example, base on what you have observed or known of.
Contrast automated vs manual policy enforcement controls : Contrast automated vs. manual policy enforcement controls. Who is ultimately liable for risk, threats, and vulnerabilities?
Types of virus-malicious code and protective measures : 1. What is a virus? 2. What is malware? 3. What are the different types of virus and malicious code?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What steps do you have to take after ethical hacking

What steps do you have to take after ethical hacking activities? List 10 of the most common steps that you think are necessary.

  Develop comprehensive policy

You assume as role of project manager of project to develop comprehensive policy for managing pedestrian traffic flow in popular downtown metropolitan district.

  All pos- sible divisions of v into three substrings

Suppose Σ = {a, b, c} and v = v1, ..., vn, n = 3, v = abbc. Give all pos- sible divisions of v into three substrings, v = v1v2v3

  Experiment involving a toxic substance

In an experiment involving a toxic substance, the probability that a white mouse will be alive for 10 hours is .1

  What is the result of issuing 0x08 function code

In a SCADA system, what is the result of issuing 0x08 function code followed by a 0x01 subfunction code on a slave using Modbus?

  Improve overall connectivity across their corporate campus

Sunshine Health Corporation is seeking to improve overall connectivity across their corporate campus near the Hawaii Kai Marina, Honolulu, Hawaii.

  Device participants in business networks

University of the Cumberlands-Write a response on how ERP systems uses device participants in business networks.

  What is the goal of information security

Managing users, assets, and access are essential elements of network management. What is the goal of information security?

  Find the length of the tube and the power required to heat

The heat exchanger consists of a 50-mm-ID tube with a surface temperature maintained uniformly at 500°C by an electric heater. Find the length of the tube and the power required to heat 4 kg/s and 8 kg/s of bismuth.

  Discuss the cons of virtualization

Compare and contrast the two most popular virtualization software packages.

  Voluntarily give up to get an extra pear

Inez reports that an extra banana would increase her utility by two units and an extra pear would increase her utility by six units. What is her MRS of bananas for pears-that is, how many bananas would she voluntarily give up to get an extra pear?

  Present opportunities for a workforce leader

What is diversity? What graphic model, drawing, picture, google link, verse or ‘famous quotation,' etc. captures your definition of diversity? Does "diversity" present opportunities for a workforce leader?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd