Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Project Part 2: Identify Vulnerabilities in IT Security Scenario Aim Higher College has been the target of focused attacks from a variety of attackers. Your

Project Part 2: Identify Vulnerabilities in IT Security

Scenario

Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

Required Resources

Access to the Internet

Text sheet: Zenmap Intense Scan Results (ts_zenmapscan)

Tasks

Analyze the results of the Zenmap scan. Your report must answer the following questions:

What are the first five open ports as identified by the Zenmap scan?

Include the port number

Include the service name

Include a brief description of how each is used

The Nessus scan identified two critical

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

explain the need for human resource strategies in organisations

Answered: 1 week ago

Question

describe the stages involved in human resource planning

Answered: 1 week ago