![]() You used to have to choose the “best vendor” and use their equipment exclusively. It is something that allows better communication of vulnerabilities across your systems and even different vendors. ![]() Your vulnerability databases, services, and tools can now talk to each other. Explain how the CVE search listing can be a tool for security practitioners and a tool for potential hackers. ![]() It attempts to provide common names for publicly known problems with the goal of making it easier for companies to share vulnerabilities across different tools that they may have in their organizationġ2. It is a list of what the potential exploits are and the severity of the vulnerability. Specify what CVE-2009-3555 is and what the potential exploits are, and assess the severity of the vulnerability. When you identify a known software vulnerability, where can you go to access the risk impact of the software vulnerability? It’s located in the server section of the application, or a software iconġ1. There are always ports that will need to be open, but ones that have no need to be open should be closed.ġ0. Are open ports necessarily a risk? Why or why not? An open port is only a risk if it is not supposed to be open. While Nessus provides suggestions for remediation steps, what else does Nessus provide that can help you assess the risk impact of the identified software vulnerability? It provides a way either through a patch or update that will allow you to repair that vulnerabilityĩ. Nine IP Addresses scanned, 49.39 seconds, 256 IP Addresses (5 hosts) scanned in 5433.44 SecondsĨ. How many IP hosts were identified in the Nessus vulnerability Scan? Depends on the scan What is the source IP address of the Cisco Security Appliance Device? 172.30.0.1ħ. From the Zen Map GUI pdf report page 6, who ports and services are enabled on the Cisco Security Appliance Device? 22 / TCP Open SSH Cisco SSH 1.25Ħ. How many total scripts does the Intense Scan using ZenMap GUI perform? Runs 36 Scriptsĥ. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? NessusĤ. Which scanning application is better for performing a network discovery Reconnaissance probing of an IP Network infrastructure? NMapģ. It analyzes the ports and looks for potential security issuesĢ. NMAP is run most of the time on a host and port discovery, Nessus is usually installed on servers and takes it to the next level. What are the differences between ZenMap GUI and Nessus?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |