Reference no: EM132221576 
                                                                               
                                       
Complete the Practice Lab titled "Inventory Assets on Network and Identify Vulnerabilities."
Capture screenshots and place in a Microsoft® Word document as specified within the lab instructions.
At the end of the lab, you will be asked to respond to the following in a 1- to 2-page response at the end of your Microsoft® Word document:
•	Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores.
•	Are the results of default scans different than the credentialed scan?
•	Why might that be?
•	What types of vulnerabilities might an attacker without any credentials be able to identify and exploit?
•	This was a simple three computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
•	Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud?
                                       
                                     
                                    
	
		| What is the most common implementation
                                        : Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). | 
		| Find one article for your annotated bibliography
                                        : Find one article for your annotated bibliography using the tips mentioned in the tutorial. Then list the source in APA format and write a summary/critique. | 
		| Describe and document the recommended security strategy
                                        : Determine the information technology/security gaps and develop a security strategy that includes issues relating to confidentiality, integrity, and availability | 
		| How four articles on the topic can be synthesized
                                        : This is not a perfect paper. However, it serves as a good example of how a topic can be researched and how four articles on the topic can be synthesized. | 
		| What types of vulnerabilities might an attacker identify
                                        : What types of vulnerabilities might an attacker without any credentials be able to identify and exploit? | 
		| Find a topic that interests you about an artist
                                        : Find a topic that interests you about an artist, writer, musician, architect or a figure from some other art who comes from one your cultures of origin. | 
		| What collection techniques do you prefer and why
                                        : Compare and contrast the 3 data collection techniques you selected. Lastly, what collection techniques do you prefer and why? | 
		| Write an essay in which you explain your stance
                                        : Prompt: For this week's assignment, you are to write an essay in which you explain your stance/perspective on a topic such as education, parenting, adoption. | 
		| Why is it so important to formulate your brief for a data
                                        : Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. |