This question has been answered by Expert on Jun 9, 2012. View Solution
posted a question
Lab Questions - Part A

Answer each of to the following questions using the reports you generated.

1. List several services running on each host? (5 points)
2. Is Nmap able to identify the operating system running on each system? Is there any Nmap feature than can be used to guess the OS of the host? Explain your answer. Using the ports that are open and the probable services running on those ports, determine what operating systems are running on the devices. Explain your answer. (15 points)
3. Which host appears most secure? Least secure? Explain your answers. (5 points)
4. Describe several uses of Nmap. (5 points)
5. Which feature(s) of Nmap did you find the most useful and why? (5 points)
6. Which feature(s) of Nmap did you find the most difficult to use and why? (5 points)
7. Research a command or feature that you consider important but not covered in the lab. Describe its usage and report your findings when running the command against the host in the lab. (10 points)





B. Lab Questions - Part B:
Answer each of the following questions:

1. What operating systems are running on the different hosts? (4 points)
2. What web server (if any) is running on each computer? (4 points)
3. List several services running on each computer? (4 points)
4. Which host had the highest number of vulnerabilites? The least number of vulnerabilities? (4 points)
5. Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control(s) to minimize the risk from the vulnerability. (4 points)
6. Describe various uses of Nessus. (4 points)
7. Which feature(s) of Nessus did you find the most useful and why? (4 points)
8. Which feature(s) of Nessus did you find the most difficult to use and why? (4 points)
9. What are the differences between using Nessus and Nmap? (4 points)
10. What would you change about this lab? Any suggestion or feedback? (4 points)
11. Research a command or feature that consider important but not covered in the lab. Describe its usage and report your findings when running the command or feature against the host in the lab. (10 points)

Note: Use screenshots to support your answers when necessary to answer the above questions.
Expert answered the question
Dear Student,

These questions can only be answered by you,please understand that if i...  View Full Answer