Nt2670 Unit 4 Assignment 1 Modes

Davonte Brown Lab #1 1. Name at least five applications and tools used in the lab. Introduction: Wireshark, NetWitness, OpenVAS, FileZilla, Tftpd64, PuTTY, Zenmap 2. What is promiscuous mode? Part 1, Step 4: Promiscuous mode allows an application to listen to all traffic on a given subnet or VLAN. 3. How does Wireshark differ from NetWitness Investigator? Part 1, Steps 2 and 14: Wireshark captures live traffic and displays results at the packet level. NetWitness Investigator provides an aggregated overview of previously captured traffic which can be used to spot anomalies, compliance issues, and attacks. 4. Why is it important to select the student interface in the Wireshark? Part 1, Step 3: To select the student lab environment. Choosing the Public network will prevent Wireshark from seeing traffic that is related to the lab. 5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of Figure 16: nmap -T4 -A -v

Unformatted text preview: Quick Scan Plus, Quick Traceroute, Regular Scan, Slow comprehensive scan 7. There were 5 different tests (scripts) the intense scan performed, Ping (or Arp Ping), TCP Port Scan (SYN Stealth), Service Scan, Operating System Detection (OS detection), and Traceroute. 8. Based on my interpretation of the Intense Scan, the result of each test script performed is Arp Ping: Discovers how many hosts are alive TCP Port Scan: Identifies open TCP ports Service Scan: Looks for fingerprint of known services by testing responses to certain types of packets Remote Operating System Scan: Fingerprints remote OS by testing responses to certain types of packets Traceroute: Discovers the IP path to the remote system 9. There are a total of 6 IP hosts that Zenmap found on the network,,,,,,
View Full Document

0 thoughts on “Nt2670 Unit 4 Assignment 1 Modes

Leave a Reply

Your email address will not be published. Required fields are marked *