Reference no: EM133054654
Using NMAP and Zenmap sets the foundation for an enumeration and network identification.
Part 1:
In this lab, you will use NMAP and Zenmap setup, basic scanning, and network topology. Complete the following:
View the "NMAP and Zenmap Lab" video, located in the Class Resources.
Provide screenshots of your Windows 7 IP address, your Kali IP address, Netdiscover, nmap -sn command, nmap services scan, nmap intrusive scan, Zenmap network topology, and two additional nmap scans not covered in the video.
Part 2:
Write a lab report and include a title page, table of contents, overview, and summary. Address the following in the summary:
Identify what service pack is running on your Windows 7 system.
Describe what is meant by an intrusive scan.
Summarize what your two additional NMAP scans do and provide screenshots.
Irrefutable Laws of Leadership by Maxwell
: Discuss three of The 21 Irrefutable Laws of Leadership by Maxwell from Laws 15-21 focusing on Leadership.
|
What are components of active listening
: What are the 3 usual response strategies to difficult people? What are the components of active listening?
|
Example of physical access control
: Relate access control in the computer world to the physical world. In your own words, provide an example of physical access control
|
Different types of access control-RBAC-MAC and ABAC
: Defines three different types of access control: RBAC, MAC, and ABAC. Research either rule-based or discretionary-based access control.
|
Nmap and zenmap sets foundation
: Using NMAP and Zenmap sets the foundation for an enumeration and network identification. Identify what service pack is running on your Windows 7 system.
|
Handling categorical attributes
: What are the techniques in handling categorical attributes? How do continuous attributes differ from categorical attributes?
|
Safely share security data
: Describe and discuss ways, if any, we can safely share security data. Are there precautions we can take, technical solutions we can use,
|
ERM Road Map
: Summarize the COSO Risk Management Framework and COSO's ERM process. Analyze the methods for establishing key risk indicators (KRIs).
|
Presentation of evidence
: Being an expert witness is a difficult task. What is the primary role for an expert witness working for the court and not for either side?
|