1 / 2

CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities//tutorfortune.com

CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities//tutorfortune.com<br><br>Click on below link to buy<br>https://tutorfortune.com/products/cyb-205-week-1-individual-inventory-assets-on-network-and-identify-vulnerabilities<br><br>CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities<br> <br><br>Complete the Practice Lab titled u201cInventory Assets on Network and Identify Vulnerabilities.u201d<br><br>Capture screenshots and place in a Microsoftu00ae Word document as specified within the lab instructions.<br><br>At the end of the lab, you will be asked to respond to the following in a 1- to 2-page response at the end of your Microsoftu00ae Word document<br> <br><br>Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores.<br> <br><br>Are the results of default scans different than the credentialed scan?<br><br><br>Why might that be?<br><br><br>What types of vulnerabilities might an attacker without any credentials be able to identify and exploit?<br> <br><br>This was a simple three computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?<br><br><br>Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud?<br> <br>Submit your assignment using the Assignment Files tab.<br>CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities<br><br>Click on below link to buy<br>https://tutorfortune.com/products/cyb-205-week-1-individual-inventory-assets-on-network-and-identify-vulnerabilities<br>

huptup
Download Presentation

CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities//tutorfortune.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities//tutorfortune.com Click on below link to buy https://tutorfortune.com/products/cyb-205-week-1-individual-inventory-assets-on-network-and- identify-vulnerabilities C Y B 2 0 5 We e k 1 I n d i v i d u a l : I n v e n t o r y A s s e t s o n N e t w o r k a n d I d e n t i f y V u l n e r a b i l i t i e s   C o mp l e t e   t h e P r a c t i c e L a b t i t l e d “ I n v e n t o r y A s s e t s o n N e t w o r k a n d I d e n t i f y V u l n e r a b i l i t i e s . ” C a p t u r e   s c r e e n s h o t s a n d p l a c e i n a Mi c r o s o f t ®   Wo r d d o c u me n t a s s p e c i fi e d w i t h i n t h e l a b i n s t r u c t i o n s . A t t h e e n d o f t h e l a b , y o u w i l l b e a s k e d t o   r e s p o n d   t o t h e f o l l o w i n g i n a 1 - t o 2 - p a g e r e s p o n s e a t t h e e n d o f y o u r Mi c r o s o f t ®   Wo r d d o c u me n t   Wr i t e a b r i e f d e s c r i p t i o n o f a v u l n e r a b i l i t y f o u n d i n t h e s c a n , i n c l u d i n g t h e o p e r a t i n g s y s t e m o n w h i c h i t w a s f o u n d , i t s r i s k f a c t o r , a n d i t s C V S S s c o r e s .   A r e t h e r e s u l t s o f d e f a u l t s c a n s d i ff e r e n t t h a n t h e c r e d e n t i a l e d s c a n ? Wh y mi g h t t h a t b e ? Wh a t t y p e s o f v u l n e r a b i l i t i e s mi g h t a n a t t a c k e r w i t h o u t a n y c r e d e n t i a l s b e a b l e t o i d e n t i f y a n d e x p l o i t ?   T h i s w a s a s i mp l e t h r e e c o mp u t e r L A N . H o w mu c h mo r e c o mp l i c a t e d w o u l d t h i s p r o c e s s b e f o r 1 0 0 c o mp u t e r s ? Wh a t a b o u t a n e n t e r p r i s e w i t h 1 0 , 0 0 0 c o mp u t e r s o n t h e i r L A N / WA N ?

  2. C o n s i d e r a c l o u d - h o s t e d I n f r a s t r u c t u r e a s a S e r v i c e ( I a a S ) e n v i r o n me n t w i t h ma n y n e w , i n t e r n e t - a c c e s s i b l e s y s t e ms r e g u l a r l y b e i n g b u i l t a n d b r o u g h t o n l i n e . Wh a t a d v a n t a g e s o r c h a l l e n g e s mi g h t t h e r e b e w i t h r e g a r d t o v u l n e r a b i l i t y ma n a g e me n t i n t h e c l o u d ?   S u b mi t   y o u r a s s i g n me n t u s i n g t h e A s s i g n me n t F i l e s t a b . C Y B 2 0 5 We e k 1 I n d i v i d u a l : I n v e n t o r y A s s e t s o n N e t w o r k a n d I d e n t i f y V u l n e r a b i l i t i e s Click on below link to buy https://tutorfortune.com/products/cyb-205-week-1-individual-inventory-assets-on-network-and- identify-vulnerabilities

More Related