Devry MIS 589 Week 6 ilab latest

  • Description
  • Size Guide
  • Reviews (0)

Description

Devry MIS 589 Week 6 ilab latest

 

iLabGrading Rubric:

Category Description
Exercise 1: Network Footprinting (100 points)

Questions 1–10 (8 points each, 80 points total)

Conclusion (20 points)

Answer each question in one or more college-level sentences.

Minimum of two paragraphs that summarizes your learning and concludes your accomplishments in the lab

Total = 100 points A quality paper will meet or exceed all of the above requirements.

Deliverables:

Important:A report template is provided beginning on the next page, and you must use it to submit your assignment. Before submitting your assignment, deletethe pages containing the instruction and rubric.

Your submitted assignment should begin with the title page and only contain your report. Don’t forget to place your name, your professor’s name, and the date on the title page.

 

 

Week 6iLab Report

Replace with your name

DeVry University

MIS589: Networking Concepts and Applications

Network Footprinting

Submitted to:

Professor: Name of your professor

Date: Current date

 

Specific Questions from iLab

Guidelines

  • Answer each of the following questions using the sequence and data from the iLab instructions.Answer all questions in full graduate-level sentences.
  1. 1.What was the purpose of TigerVNC?________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  2. 2.What was the purpose of Kali Linux?________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  3. 3.What did the following command do when typed in Kali Linux’s terminal window?nmap 192.168.0.0/24 >hosts.txt

    ________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  4. 4.What did the following command do when typed in Kali Linux’s terminal window?nmap –O –sS 192.168.0.0/24 > hosts.txt

    ________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  5. 5.What was the difference between nmap and zenmap?________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

General Questions aboutNetwork Footprinting

Guidelines

  • Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web.Answer all questions in full graduate-level sentences and paragraphs.
  1. 6.What is accomplished by network footprinting?________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  2. 7.What are the countermeasures a network security architect can set in motion to diminish the threat from network footprinting?________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  3. 8.What is the difference between network footprinting and network reconnaissance?________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  4. 9.In the context of network security, explain what is meant by after reconnaissance comes penetration.________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

  5. 10.What is a denial of service (DOS) attack?________________________________________________________________________________

    ________________________________________________________________________________

    ________________________________________________________________________________

Conclusion

Guidelines

Minimum of two paragraphs that describe the following:

  • What youaccomplished in the assignment or iLab
  • What youlearned from performing it
  • How it relates to course material
  • How youfeel it will benefit youin your academic and professional career

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

References

Guidelines

  • Include all references used to complete this iLab.This must be in APA format.

 

DeVry Courses helps in providing the best essay writing service. If you need 100% original papers for Devry MIS 589 Week 6 ilab latest, then contact us through call or live chat.

Devry MIS 589 Week 6 ilab latest

Best Devry MIS 589 Week 6 ilab latest

Devry MIS 589 Week 6 ilab latest

 

 

Reviews

There are no reviews yet.


Be the first to review “Devry MIS 589 Week 6 ilab latest”