Lab a couple of Answers Nessus Essay

Lab a couple of Answers Nessus

Laboratory #2

Lab #2: Perform a Vulnerability Assessment Check Using Nessus® (Nessus® is a Registered Brand of Tenable Network Security, Inc. )

Learning Aims and Final results

Upon completing this laboratory, students can complete the subsequent tasks: * Identify dangers, threats, and vulnerabilities within an IP network infrastructure using ZenMap GUI (Nmap) to accomplish an IP host, slot, and services scan 2. Perform a vulnerability assessment scan on a targeted IP subnetwork using Nessus® * Compare the benefits of the ZenMap GUI " Intense Scan” with a Nessus® vulnerability examination scan 2. Assess the studies of the weakness assessment check and recognize critical vulnerabilities * Produce recommendations for mitigating the determined risks, risks, and vulnerabilities as described on the CVE database real estate

Laboratory #2 – Assessment Worksheet

Perform a Weeknesses Assessment Check Using Nessus®

Course Term & Quantity: Information Security System IS433

Student Name: Anh N Adecuadamente

Instructor Term: Rich Fesl

LAB Deadline: 1/29/2013


This research laboratory demonstrates the first a few steps in the hacking process that is commonly performed when ever conducting moral hacking or perhaps penetration assessment. The first step in the hacking procedure is to conduct an IP host finding and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security checking software. The second step in the hacking procedure is to perform a vulnerability analysis scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability examination scanning computer software. Finally, the third step in the hacking method (Step three or more: Enumeration) should be to identify data pertinent towards the vulnerabilities found in order to exploit the weeknesses.

Lab Assessment Questions & Answers

1 ) What is the application ZenMap GUI typically utilized for? Describe a scenario in which you would employ this type of...