Nmap and zenmap sets foundation

Assignment Help Basic Computer Science
Reference no: EM133054654

Using NMAP and Zenmap sets the foundation for an enumeration and network identification.

Part 1:

In this lab, you will use NMAP and Zenmap setup, basic scanning, and network topology. Complete the following:

View the "NMAP and Zenmap Lab" video, located in the Class Resources.

Provide screenshots of your Windows 7 IP address, your Kali IP address, Netdiscover, nmap -sn command, nmap services scan, nmap intrusive scan, Zenmap network topology, and two additional nmap scans not covered in the video.

Part 2:

Write a lab report and include a title page, table of contents, overview, and summary. Address the following in the summary:

Identify what service pack is running on your Windows 7 system.

Describe what is meant by an intrusive scan.

Summarize what your two additional NMAP scans do and provide screenshots.

Reference no: EM133054654

Questions Cloud

Irrefutable Laws of Leadership by Maxwell : Discuss three of The 21 Irrefutable Laws of Leadership by Maxwell from Laws 15-21 focusing on Leadership.
What are components of active listening : What are the 3 usual response strategies to difficult people? What are the components of active listening?
Example of physical access control : Relate access control in the computer world to the physical world. In your own words, provide an example of physical access control
Different types of access control-RBAC-MAC and ABAC : Defines three different types of access control: RBAC, MAC, and ABAC. Research either rule-based or discretionary-based access control.
Nmap and zenmap sets foundation : Using NMAP and Zenmap sets the foundation for an enumeration and network identification. Identify what service pack is running on your Windows 7 system.
Handling categorical attributes : What are the techniques in handling categorical attributes? How do continuous attributes differ from categorical attributes?
Safely share security data : Describe and discuss ways, if any, we can safely share security data. Are there precautions we can take, technical solutions we can use,
ERM Road Map : Summarize the COSO Risk Management Framework and COSO's ERM process. Analyze the methods for establishing key risk indicators (KRIs).
Presentation of evidence : Being an expert witness is a difficult task. What is the primary role for an expert witness working for the court and not for either side?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Satellite communication solutions

Some businesses have no alternative but to use satellite communication solutions.

  Describe benefits of estimating risk using a monte carlo

Consider the risks and plans described by your classmates and make suggestions for other mitigation options.

  Type of cryptography or encryption

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption.

  Explain the differences between static and dynamic models

How does prescriptive analytics relate to descriptive and predictive analytics? Explain the differences between static and dynamic models.

  Proactively manage the e-discovery process

Briefly discuss the three reasons why corporations must proactively manage the e-discovery process?

  What percent of the students accepted were asian

Magnet schools revisited. The Chance magazine article described in Exercise 9 further examined the impact of an applicant's ethnicity on the likelihood of admission to the Houston Independent School District's magnet schools programs.

  Difference between passive and active security threats

What is the OSI security architecture? What is the difference between passive and active security threats?

  Pick favorite snack food

Pick a favorite snack food that requires you to take at least eight steps to prepare.

  Executive management team of medium-sized business

The executive management team of a medium-sized business wants to be more customer focused in the marketplace.

  What type of attack

When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you just become a victim of?

  Applied doctoral studies in business

Why did you choose to obtain your doctorate degree? (with 3 masters degrees all in business. What do you expect to happen in your doctoral journey?

  Average of inflation rate

How much will you need in the first year of retirement assuming a 3.25% average of inflation rate?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd