What is the major difference between zenmap and openvas

Assignment Help Computer Engineering
Reference no: EM131188382

Lab: Performing a Vulnerability Assessment

Overview

In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings.

Lab Assessment Questions & Answers

1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application.

2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical hacking process?

3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?

4. What is a CVE listing? Who hosts and sponsors the CVE database listing Web site?

5. Can Zenmap detect which operating systems are present on IP servers and workstations? Which option includes that scan?

6. How can you limit the breadth and scope of a vulnerability scan?

7. Once a vulnerability has been identified by OpenVAS, where would you check for more information regarding the identified vulnerability, exploits, and any risk mitigation solution?

8. What is the major difference between Zenmap and OpenVAS?

9. Why do you need to run both tools like Zenmap and OpenVAS to complete the reconnaissance phase of the ethical hacking process?

Reference no: EM131188382

Questions Cloud

What is best estimate of nominal interest rate on new bonds : Absalom Motors's 14% coupon rate, semiannual payment, $1,000 par value bonds that mature in 10 years are callable 3 years from now at a price of $1,075. The bonds sell at a price of $1,352.47, and the yield curve is flat. Assuming that interest rates..
Make single investment : Mary White would like to make a single investment and have $2 million at the time of her retirement in 35 years. She has found an investment fund that will pay interest at 4% annually. How much will Mary need to invest today? What if Mary were studyi..
What is the payback period of this investment : You are considering making a movie. The movie is expected to cost $100 million upfront and takes a year to make. After that, it is expected to make $83 million in the first year it is released and $5 million for the following 20 years. Your cost of c..
Reduced as a result of the tax loss carryforward : Assume that Citrus Corporation is considering the acquisition of Orange Juice, Inc. The latter has a $500,000 tax loss carryforward. How much will the total taxes of Citrus Corporation be reduced as a result of the tax loss carryforward?
What is the major difference between zenmap and openvas : What is the major difference between Zenmap and OpenVAS? Why do you need to run both tools like Zenmap and OpenVAS to complete the reconnaissance phase of the ethical hacking process?
Regard to the execution of many compensation plans : Define agency cost and explain why firms incur them. How can management structure management compensation to minimise agency problems? What is the current view with regard to the execution of many compensation plans?
Why is it important to select student interface in wireshark : How does Wireshark differ from NetWitness Investigator? Why is it important to select the student interface in the Wireshark? What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?
Implement the pong game : CAB202 Assignment: Pong. Your task is to implement the Pong game. Throughout the semester, you have been provided with a number of examples of skeleton code for implementing games with the CAB202 ZDK library
What is the principal balance on the loan after one year : Suppose you are able to borrow funds with a 3-year loan with monthly loan payments to finance the capital investment. The bank has agreed to a interest rate matching the appropriate discount rate on the project(or projects). Prepare a loan amortizati..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Illustrate the constraint graph

Illustrate the constraint graph

  Determine the capacitance full-wave rectifier

Assume the input signal to a rectifier circuit has a peak value of Vm = 12 V and is at a frequency of 60 Hz. Assume the output load resistance is R = 2kΩ and the ripple voltage is to be limited to Vr= 0.4 V. Determine the capacitance required to y..

  Write a program that inputs several lines of text

Write a program that inputs several lines of text and a search character and uses function strchr to determine the total occurrences of the character in the lines of text.

  How this technology works

"An emerging technology not in use at the company such as a wireless network or PDAs."

  Show what is the current size of s

Consider an initially empty stack S has performed a total of 25 push operations, 12 top operations, and 10 pop operations, 3 of which generated EmptyStackExceptions, which were caught and ignored. Show what is the current size of S?

  Create a gui pad that has numbers and letters

Create a GUI pad that has numbers and letters(That can be capitalized), and a text area to display One button that clears the text.

  Explain your experience installing the microsoft office

write a short paragraph in which youquestion 1 describe your experience installing the microsoft office suite software.

  What role does technology or social media have on how we

1.what role do you think media internet music industry movies or advertising play the development of our self-concept?

  Explaining the rsa

Using the RSA with p = 3, q = 11, e = 7: Explain the suitable value for d? Encode the message “cat” by encrypting each letter separately, i.e., by encrypting ASCII code of each letter.

  Write down some of the companies which make embedded

what are some of the companies that make embedded operating systems and are these operating systems just scaled down

  Healthcare it

Summarizing everything you have learned related to the Healthcare IT, describe what has been the most surprising or the interesting lesson that is learned.

  Describe three different specific malware instances

Describe three different specific malware instances, with specific real life impact. What is the worst that can happen in these three instances? Defenses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd