Reference no: EM131188380
Lab: Performing Reconnaissance and Probing Using Common Tools
Overview
In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart.
Lab Assessment Questions & Answers
1. Name at least five applications and tools used in the lab.
2. What is promiscuous mode?
3. How does Wireshark differ from NetWitness Investigator?
4. Why is it important to select the student interface in the Wireshark?
5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?
6. Name at least five different scans that may be performed with Zenmap.
7. How many different tests (i.e., scripts) did your Intense Scan perform?
8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report.
9. How many total IP hosts did Zenmap find on the network?
What is the payback period of this investment
: You are considering making a movie. The movie is expected to cost $100 million upfront and takes a year to make. After that, it is expected to make $83 million in the first year it is released and $5 million for the following 20 years. Your cost of c..
|
Reduced as a result of the tax loss carryforward
: Assume that Citrus Corporation is considering the acquisition of Orange Juice, Inc. The latter has a $500,000 tax loss carryforward. How much will the total taxes of Citrus Corporation be reduced as a result of the tax loss carryforward?
|
What is the major difference between zenmap and openvas
: What is the major difference between Zenmap and OpenVAS? Why do you need to run both tools like Zenmap and OpenVAS to complete the reconnaissance phase of the ethical hacking process?
|
Regard to the execution of many compensation plans
: Define agency cost and explain why firms incur them. How can management structure management compensation to minimise agency problems? What is the current view with regard to the execution of many compensation plans?
|
Why is it important to select student interface in wireshark
: How does Wireshark differ from NetWitness Investigator? Why is it important to select the student interface in the Wireshark? What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?
|
Implement the pong game
: CAB202 Assignment: Pong. Your task is to implement the Pong game. Throughout the semester, you have been provided with a number of examples of skeleton code for implementing games with the CAB202 ZDK library
|
What is the principal balance on the loan after one year
: Suppose you are able to borrow funds with a 3-year loan with monthly loan payments to finance the capital investment. The bank has agreed to a interest rate matching the appropriate discount rate on the project(or projects). Prepare a loan amortizati..
|
Managing business ethics
: (Managing Business Ethics: Straight Talk About How To Do It Right, 6th edition), the authors assert their 'firm' belief "that business isn't just 'better' when companies and business people are ethical, but rather that good ethics is absolutely essen..
|