CYB 205 Wk 1 – Apply: Inventory Assets on Network and Identify Vulnerabilities

0 items
CYB 205 Wk 1 - Apply: Inventory Assets on Network and Identify Vulnerabilities
CYB 205 Wk 1 – Apply: Inventory Assets on Network and Identify Vulnerabilities
$9.00
  • Description

CYB 205 Wk 1 – Apply: Inventory Assets on Network and Identify Vulnerabilities

At the end of the practice lab, you will be asked to respond to the following in a 1- to 2-page response at the end of your Microsoft® Word document:

 

Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores.

 

Address the following questions in your description:

  • Are the results of default scans different than the credentialed scan?
  • Why might that be?
  • What types of vulnerabilities might an attacker without any credentials be able to identify and exploit?
  • This was a simple 3-computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  • Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud?

 

Submit your assignment.