Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Identify the tools and techniques to be used to perform host discovery and enumeration. Procedure: List out the tools you plan on using to perform

Identify the tools and techniques to be used to perform host discovery and enumeration. 

Procedure: List out the tools you plan on using to perform network scans, the purpose for using them, and how you will use them. For example: 1. Tool: Nmap. 

Purpose: Obtain information on hosts and the services and operating systems they are running.

 Commands: 

 Provide a description of the tools you plan on using for the network scans, your reasoning for selecting them, and how they will be used. Be sure to include any challenges and potential drawbacks or limitations. Deliverable should cover at least 5 tools/resources. 

. NOTE: Kali is not a tool; it is a Linux distribution or collection of tools, so do not include it in your list. 

Step by Step Solution

There are 3 Steps involved in it

Step: 1

Certainly here are five tools commonly used for host discovery and enumeration in network security assessments along with their purposes commands reas... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management Accounting Information for Decision-Making and Strategy Execution

Authors: Anthony A. Atkinson, Robert S. Kaplan, Ella Mae Matsumura, S. Mark Young

6th Edition

137024975, 978-0137024971

More Books

Students also viewed these Computer Network questions

Question

Contrast independent and dependent demand.

Answered: 1 week ago