Enumerating systems on alexander rocco network

Assignment Help Basic Computer Science
Reference no: EM133168733

Case 1: Enumerating Systems on the Alexander Rocco Network

After conducting enumeration of the Alexander Rocco network, you discover several Windows computers with shared folders for the Help Desk Department. You're concerned when you access one of the shared folders containing information for help desk personnel and find an Excel spreadsheet listing e-mail addresses and passwords for all employees. Help desk employees use this shared folder to access the Excel spreadsheet if users call saying they have forgotten their passwords and need this information even when they're away from their offices.

Case Question

a. Based on this information, write a one-page memo to the IT manager, Donald Lee, describing the steps you would take after this discovery. The memo should also mention any information you find in the OSSTMM that relates to your discovery and offer recommendations.

Case 2: Researching enum4Linux on the Internet

You are given permission to use your credentials to run some basic security checks on the Alexander Rocco domain. You don't have access to Nessus or OpenVAS, so you have to use other tools to enumerate the domain. After some research, you come across the enum4linux tool. To make sure your boss is okay with this tool, you need to tell him why you want to use enum4linux and what it's capable of.

Case Question

Write a memo on the enum4linux tool in which you describe the goal of your enumeration and the checks available in enum4linux. Your memo should persuade your boss into letting you use the tool for enumeration purposes.

Reference no: EM133168733

Questions Cloud

System security plan : Create a short presentation in PowerPoint that provides an overview of your System Security Plan
How does data and classifying data impact data mining : How does data and classifying data impact data mining? What is association in data mining?
Private sector improve trust online : How is the regulation of security and trustworthiness on the Internet likely to develop? Will the private sector improve trust online?
Cloud-based databases to support organizational operations : You've learned how to interface with cloud-based databases to support organizational operations, implement a cloud-based system
Enumerating systems on alexander rocco network : After conducting enumeration of the Alexander Rocco network, you discover several Windows computers with shared folders for the Help Desk Department.
Have you been personally affected by it ethical issue : Discuss an ethical issue IT organizations face today. Have you been personally affected by an IT ethical issue?
Social media to advertise and collect information : Many companies are using social media to advertise, collect information, or gather background on individuals. Do you think this is ethical?
Innovative ideas or inventions are the results of accident : Like many things in the world, innovative ideas or inventions are the results of an accident or a situation that triggers an idea.
Risks and rewards of supply chains : Summarize at least two trends in supply chain management and collaboration. Identify how B2B e-Commerce differs in procurement from B2C.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Installing the new operating system

Your supervisor tasked you with installing the new operating system from Microsoft on all desktops and laptops in the company.

  Web sites and their business models

We have come to depend on using the internet for so many things. We pay our bills via websites, bank online, and buy many products online such as music,

  Population standard deviation

The null and alternative hypotheses for a test are Ho: U = 19 and Ha: U

  Doctoral program application

In relation to your doctoral program application, what area of recent research in the field would you want to study, and why?

  Step in the scientific method

Discuss specifically what actions related to this scenario you will conduct for each step in the scientific method.

  Confidence interval for the population proportion

Construct a? 99% confidence interval for the population proportion. Interpret the results.

  Essay discussing sqlmap-automated tool for sql injection

Essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?

  Influence behavior on end users from security perspective

Cyber policy can influence behavior on end users from a security perspective.

  What are social networks and variables and data types

What are social networks, how do people use them, and what are some of their practical business uses?

  Major components of data warehouse architecture,

Explain the major components of a data warehouse architecture, what demands is big data placing on organizations and data management technology?

  Defining leadership styles

Defining Leadership Styles Here Is A Questionnaire For You To Take On Your "Influencing Style".

  Demonstrate the use of iterator

Write a Java program (non-GUI preferred) to demonstrate the use of Iterator. The program should allow a user to do the following:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd