Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Nmap vs nessus

19/03/2021 Client: saad24vbs Deadline: 2 Day

Assessment Questions and Answers

1. What are the differences between ZeNmap GUI (Nmap) and Nessus?

Nessus is a vulnerability scanner whereas Nmap is used for mapping a network’s hosts and the hosts’ open ports. Nmap discovers active IP hosts and gathers information about the open ports. Nessus scans ports just like Nmap, however it will notify if the open ports have potential security vulnerabilities attached to them.

2. Which scanning application is better for performing a network discovery reconnaissance probing of an IP network infrastructure?

Nmap is better for performing a network discovery reconnaissance probing of an IP network infrastructure.

3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps?

Nessus is better for performing a software vulnerability assessment.

4. How many total scripts (i.e., test scans) does the Intense Scan using ZenMap GUI perform?

There are 36 scripts loaded for scanning.

5. From the ZenMap GUI pdf report page 6, what ports and services are enabled on the Cisco Security Appliance device?

Port 443 and ssl/http service are enabled on the Cisco Security Appliance device.

6. What is the source IP address of the Cisco Security Appliance device (refer to page 6 of the PDF report)?

The IP address is 172.30.0.1

7. How many IP hosts were identified in the Nessus® vulnerability scan? List them.

There are 7 IP host. They are:

172.16.20.1

172.17.20.1

172.18.20.1

172.19.20.1

172.20.20.1

172.30.0.10

172.30.0.66

8. While Nessus provides suggestions for remediation steps, what else does Nessus provide that can help you assess the risk impact of the identified software vulnerability?

Beside remediation steps, Nessus also provides devices and software on the network that are not authorized or indicate a network compromise.

9. Are open ports necessarily a risk? Why or why not?

Of course open ports are a risk, because the attacker can use these ports to exploit the vulnerabilities such as use Trojan to make a screenshot and then send a screenshot back to the attacker.

10. When you identify a known software vulnerability, where can you go to assess the risk impact of the software vulnerability?

Common Vulnerability Scoring System (CVSS) is a place where we can go to assess the risk impact of the software vulnerability. This is a classification system for the exploitability of software vulnerabilities and exposures.

11. If Nessus provides a pointer in the vulnerability assessment scan report to look up CVE-2009-3555 when using the CVE search listing, specify what this CVE is, what the potential exploits are, and assess the severity of the vulnerability.

CVE is a list of information security vulnerabilities and exposures that provides common names for publicity known problems. CVE also helps to share data across separate vulnerability capabilities easily.

12. Explain how the CVE search listing can be a tool for security practitioners and a tool for hackers.

The CVE search listing can be an useful tool for both security practitioners and hackers since it helps practitioners and hackers know what program they can use and what they cannot to secure or hack the systems.

13. What must an IT organization do to ensure that software updates and security patches are implemented timely?

An IT organization should establish a patch management plan which evaluate the criticality and applicability to the software patch.

14. What would you define in a vulnerability management policy for an organization?

A vulnerability management policy should have defined timelines for how long an administrator has to address vulnerability on a system.

15. Which tool should be used first if performing an ethical hacking penetration test and why?

Nmap is the one that should be used when performing an ethical hacking penetration test. Because it is a powerful port scanner and auditing utility. Besides that it is an open source application and can run on many different operating systems such as Windows, Linux, Mac OS.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Quality Assignments
Fatimah Syeda
Exam Attempter
Helping Hand
Innovative Writer
Buy Coursework Help
Writer Writer Name Offer Chat
Top Quality Assignments

ONLINE

Top Quality Assignments

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$39 Chat With Writer
Fatimah Syeda

ONLINE

Fatimah Syeda

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$30 Chat With Writer
Exam Attempter

ONLINE

Exam Attempter

Give me a chance, i will do this with my best efforts

$37 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I will cover all the points which you have mentioned in your project details.

$61 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

Give me a chance, i will do this with my best efforts

$105 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I have read your project details. I can do this within your deadline.

$38 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Sabre simulation tips - Organ Leader Discussion - Exchange online plan 1 service description - Isbn 13 978 0 13 283487 2 - Kinesiology exam - Tom has a collection of 30 cds and nita - Www wda gov rw application - A salesperson clicks repeatedly on the online ads - Mixing two primary colors produces a ________ color - The first step of an organizational behavior modification (ob mod) program is - What you pawn i will redeem thesis statement - The writer's workplace with readings 8th edition answers - Warehouse tenting at the port of miami - Danske bank card blocked - Annotated Bibliography 2 - Article Summary - Julius caesar no fear shakespeare act 2 - Device removing hardness crossword - For reference only calibration - Contact sunshine coast council - Feedback fraction of colpitts oscillator - What rights were afforded probationers after the gagnon case - Strayer university acc 100 syllabus - America's cup the tension between technology and human decision makers - Process cost summary - Since 1990, job and wage research has shown that as the price of computer technology plummets, - Shadow health musculoskeletal transcript - Week 1 Brainstorming Discussions - James r jordan sr - Sentence level errors - Dux prodigy pilot light - Part 3: BRD - How to write police report narratives - In a period of rising prices, the costs allocated to ending inventory may be understated in the - Expansion loop length calculation - Grignard reaction triphenylmethanol lab report - 360g2 cassette 12 lc sm bl pigtails - Gagne's nine events of instruction lesson plan sample - Hub and spoke model in supply chain - Ron white shoe buddy meaning - Discussion - Research Design and Sampling - Darden intranet my total rewards - WEEK 8 - Hr discussion - Louis armstrong west end blues analysis - The killers hemingway analysis - Assignment - Gcu doctrinal statement - Journal/ final reflication - Professional nursing concepts and challenges 7th edition apa citation - Chapter 4 ethical and social issues in information systems - The talk funny girl - Writing exercise - Project work- Develop a Computer or Internet Security Policy- Week 5 - Balanced unbalanced forces worksheet - Questions - Pai lum kung fu - 10 Case Analysis - Two ways a woman can get hurt - Strategic human resource management jeffrey mello 4th edition - Conceptual framework of strategic cost management - Adscititious in a sentence - Ada student disability insurance - Hhmi biointeractive virus explorer answer key - Read theory analogies 3 - Statistics - Reflection paper on self assessment - Information about companies that have been harmed or bankrupted by a disaster. - Does magnesium stop gurning - Federal safeguards for financial managers - Deloitte global aerospace and defense industry outlook - Brown's stages of morphological development - 40 n 116 e - Alcoa fastening systems catalog - 33 brunts road bullarto - MARISSA JONES ONLY!!!! - Air products & controls - Testout power supply lab - Davis plus med deck - Non ohmic vs ohmic - Discussion Question - Unit VIII MOS 5101 Due Tomorrow Sept 18 @ 2pm CST PLAGIARISM FREE!!!!!!!! UTILIZE THE GRADE RUBRIC!!!!! - Navy federal membership application - MEE 5801 3 page - A woman of no importance alan bennett - Gallatin carpet cleaning is a small family owned business - Aca code of ethics cultural competence - Eyelash client consultation form - Week 2 - Rummler brache swim lane diagram - NEED IN 10 HOURS or LESS - How to calculate current density of copper - 3.47 km in miles - Ccna 3 chapter 5 exam answers - Experiment 1 classification of bones - I need 2300 words in Project Management Basics to answers my questions - Buffet service advantages and disadvantages - Lesley university bursar - Case Study on Real Estate