Chat with us, powered by LiveChat Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap. B. ?Summarize the vulnerabilities on the network and their potential implicat - Essayabode

Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap. B. ?Summarize the vulnerabilities on the network and their potential implicat

 

A.  Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.

B.  Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.

C.  Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with each  anomaly.

D.  Summarize the potential implications of not addressing each  of the anomalies found when running Wireshark.

E.  Recommend solutions for eliminating or minimizing all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for each vulnerability or anomaly.

F.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

G.  Demonstrate professional communication in the content and presentation of your submission.

REQUIREMENTS

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

A.  Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.

B.  Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.

C.  Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with  each  anomaly.

D.  Summarize the potential implications of not addressing  each  of the anomalies found when running Wireshark.

E.  Recommend solutions for eliminating or minimizing  all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for  each vulnerability or anomaly.

F.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

G.  Demonstrate professional communication in the content and presentation of your submission.

Rubric;

A:NMAP SUMMARY

COMPETENT Answer

The submission accurately describes the network topology and includes screenshots showing evidence of running Nmap.

B:NMAP VULNERABILITIES

COMPETENT answer

The submission accurately summarizes the vulnerabilities on the network, and provides plausible potential implications.

C:WIRESHARK ANOMALIES

COMPETENT answer

The submission accurately describes the anomalies found when running Wireshark and includes evidence of the range of packets associated with each anomaly.

D:IMPLICATIONS OF ANOMALIES

COMPETENT answer

The submission summarizes the potential implications of taking no action for each anomaly, and the provided implications are plausible.

E:SOLUTIONS

COMPETENT answer

The submission recommends solutions that eliminate or minimize all identified vulnerabilities and anomalies. The recommendations are supported by reliable research and sources.

F: SOURCES

COMPETENT

The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.

G: PROFESSIONAL COMMUNICATION

COMPETENT

Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.

,

Skillable Labs

  Community Administrator kthometz posted on  ‎02-22-2022 12:01 PM  ‎12-15-2023 11:52 AM

Labels:

· LEARNING RESOURCES

· Terminology

· Lab Behaviors and Impacts

· Additional Resources

 

 

Terminology

 

· Lab instance: When a lab is launched for the first time, a lab instance with a unique instance ID is created. This ID can be found under the  Help  tab in your lab. 

Figure 1. Skillable labs Help tab, highlighting the location of the instance ID. Figure 1. Skillable labs Help tab, highlighting the location of the instance ID.

· Save l ab: Lab Instances may be saved to be resumed later for up to 14 days by using the link in the performance assessment.  Note: If lab instance is not resumed within 14 days, the instance will be terminated.

· Resume lab: Saved lab instances may be resumed and the same instance ID remains.

· Clock timer: Timer begins to count down when lab is launched.

· The lab instance may be extended for 120-minute increments until 50% of the initial duration is met.

· For example, if the lab is initiated and the timer begins to count down from 4 hours remaining, when extended, it will be for 2 hours and cannot be extended again because 2 hours is 50% of the initial duration

· Another example is if the lab is initiated and the timer begins to count down from 8 hours remaining, when extended, it will be for 2 hours, then again until the 4 hours (50% of the initial duration) is met.

· When the lab runs out of time after the extension, the lab will be disconnected and work will be irretrievable. Figure 2: Skillable labs, highlighting location of of time remaining/duration. Figure 2: Skillable labs, highlighting location of of time remaining/duration.

 

 

Lab Behaviors and Impacts

 

The behaviors and impacts listed below are the result of actions taken in the “hamburger" or options menu, or end of instructions.

 

Figure 3. Skillable labs, highlighting the location of the 'hamburger'/options menu. Figure 3. Skillable labs, highlighting the location of the 'hamburger'/options menu.

· End lab

· Impact: Lab is ended and lab instance cannot be retrieved.

· Save lab

· Impact: Lab instance is saved.

· Exceptions:

· Lab instance cannot be saved if there is no more time left to extend (for example, past 150% of initial duration).

· The time remaining on a lab can be found under the title, as noted in Figure 2 above

· Lab instance cannot be saved if there is less than 5 mins remaining on the timer clock.

· User would need to extend first to add clock over 5 mins and then save.

· Lab is left running without proper shut down

· Impact: Lab instance remains active and runs down clock timer until Auto-save or save/cancel is triggered

· User closes the browser tab

· Impact: Lab instance remains active and runs down clock timer until Auto-save or save/cancel is triggered

· User allows clock timer to run out of time

· Impact: Lab instance is removed and is not retrievable by Skillable®.

 

Automatically Enrolled Resources

Textbook

Content will be drawn from the following textbook:

Doherty, J. (2022).  Wireless and Mobile Device Securit  (new tab)(opens in new tab) . Boston, MA: Jones & Bartlett Learning.  ISBN: 9781284211733

Supplemental Videos & Labs

· Bagurdes, R. (2018).  Getting Started with Wireshark(opens in new tab)  ((opens in new tab) new tab)(opens in new tab) . Pluralsight.

· Cyber Security Fundamentals. [n.d]. Practice Labs.

· Glass, M. (2018).  Getting Started with Nmap (opens in new tab) (new tab)(opens in new tab) . Pluralsight.

· Helmick, J. (2018).  Security Awareness: Mobile Devices  (new tab).(opens in new tab)  Pluralsight.

· Mobile Security. [n.d] ITProTv. 

· Practice Labs Introduction to Wireshark. [n.d]. Practice Labs.

· Run a Network Scan Using Nmap [Guided]. [n.d.]. Percipio.

· Shore, M. (2021).  Ethical Hacking: Wireless Networks  (new tab)(opens in new tab) . LinkedIn Learning.

image2.png

image3.png

image4.png

image1.gif

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?