Devry MIS 589 Week 6 ilab latest

Just Click on Below Link To Download This Course:

https://www.devrycourses.com/product/devry-mis-589-week-6-ilab-latest/

 

Devry MIS 589 Week 6 ilab latest

 

iLabGrading Rubric:

Category Description
Exercise 1: Network Footprinting (100 points)

Questions 1–10 (8 points each, 80 points total)

Conclusion (20 points)

Answer each question in one or more college-level sentences.

Minimum of two paragraphs that summarizes your learning and concludes your accomplishments in the lab

Total = 100 points A quality paper will meet or exceed all of the above requirements.

Deliverables:

Important:A report template is provided beginning on the next page, and you must use it to submit your assignment. Before submitting your assignment, deletethe pages containing the instruction and rubric.

Your submitted assignment should begin with the title page and only contain your report. Don’t forget to place your name, your professor’s name, and the date on the title page.

 

 

Week 6iLab Report

Replace with your name

DeVry University

MIS589: Networking Concepts and Applications

Network Footprinting

Submitted to:

Professor: Name of your professor

Date: Current date

 

Specific Questions from iLab

Guidelines

  • Answer each of the following questions using the sequence and data from the iLab instructions.Answer all questions in full graduate-level sentences.
  1. 1.What was the purpose of TigerVNC?________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 2.What was the purpose of Kali Linux?________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 3.What did the following command do when typed in Kali Linux’s terminal window?nmap 192.168.0.0/24 >hosts.txt

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 4.What did the following command do when typed in Kali Linux’s terminal window?nmap –O –sS 192.168.0.0/24 > hosts.txt

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 5.What was the difference between nmap and zenmap?________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

General Questions aboutNetwork Footprinting

Guidelines

  • Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web.Answer all questions in full graduate-level sentences and paragraphs.
  1. 6.What is accomplished by network footprinting?________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 7.What are the countermeasures a network security architect can set in motion to diminish the threat from network footprinting?________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 8.What is the difference between network footprinting and network reconnaissance?________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 9.In the context of network security, explain what is meant by after reconnaissance comes penetration.________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

  1. 10.What is a denial of service (DOS) attack?________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

Conclusion

Guidelines

Minimum of two paragraphs that describe the following:

  • What youaccomplished in the assignment or iLab
  • What youlearned from performing it
  • How it relates to course material
  • How youfeel it will benefit youin your academic and professional career

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

References

Guidelines

  • Include all references used to complete this iLab.This must be in APA format.

 

Download File Now