What are the normal steps to take to remediate a vulnerable system?

Words: 1012
Pages: 4
Subject: Uncategorized

IT262M1-1: Interpret network and reconnaissance results. Read the following chapters in your text: •Chapter 1: “Getting Started: Essential Knowledge” •Chapter 2: “Reconnaissance: Information Gathering for the Ethical Hacker” Chapter 1 includes a primer on the basics of networking that will be needed to build upon as the course progresses. The OSI model and its relationship to the TCP/IP protocol suite are discussed. In addition, basic security concepts are covered like the CIA triangle and computer access control systems. Chapter 2 discusses the significance of information gathering for the ethical hacker. It notes the differences between active and passive information gathering. In addition, it highlights domain name lookups and the use of Google© to uncover organizational information. Purpose You will complete two labs in this assessment. The first lab will review the TCP/IP protocol stack with some reduction of the attack surface of your domain servers. This is critically important in the modern business environment and the basic communication protocol of the Internet. The second lab will review the TCP/IP handshake and DNS enumeration. TCP/IP is the bedrock of the Internet and is very important to the study of ethical hacking. Read the assessment and respond to the checklist items based on the reading and learning activities. Instructions Part 1: Assessing and Securing Systems on a Wide Area Network (WAN) Lab Instructions This lab provides the hands-on element to your studies. It allows you to gain practical experience using the tools and techniques associated with ethical hacking. Access the lab link entitled ″Assessing and Securing Systems on a Wide Area Network (WAN)″ in this assessment section. The following resources will help you get oriented in the lab environment: the Common Lab Tasks Manual and J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference. Open a new Microsoft® Word® document and put your name and assessment number at the top. In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions. Complete the instructions in Step 1. Compile your lab report in the document with a title page and an easy to understand explanation of what you are doing and why you are doing it. Within your document, after your lab report, answer the question in Step 2. Conduct research and cite supporting sources in APA format where appropriate. Complete the following: Step 1: Open the lab entitled ″Assessing and Securing Systems on a Wide Area Network (WAN).” Review the following materials in the lab environment: •Before you Begin •Introduction •Section 1. Hands-On Demonstration When you are ready to begin click: “Section 2: Applied Learning.” Complete Parts 1, 2, 3, and 4. Make sure to obtain the required screenshots that are requested in the lab instructions and rubric. As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document: In your comparison of the scans, provide additional information that outlines the possible reasons for differences behind the scans. Step 2: Answer the following question in the lab document as part of the lab submission. Respond with a minimum of 100 words. 1. What are the normal steps to take to remediate a vulnerable system? As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document: Provide additional information and 200 words or more that indicates a consideration of other steps that might be used to remediate a vulnerable system. Part 2: Data Gathering and Footprinting on a Targeted Web Site Lab Instructions Access the lab link entitled ″Data Gathering and Footprinting on a Targeted Web Site″ in this assessment section. The following resources will help you get oriented in the lab environment: the Common Lab Tasks Manual and J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference. You will append the results of the second lab to the results of the first lab. Make sure to label the labs. In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions. Complete the instructions in Step 1. Compile your lab report in the document with a title page and an easy to understand explanation of what you are doing and why you are doing it. Within your document, after your lab report, answer the questions in Step 2. Conduct research and cite supporting sources in APA format where appropriate. Complete the following: Step 1: Open the lab entitled ″Data Gathering and Footprinting on a Targeted Web Site.” Review the following material in the lab environment: •Before you Begin •Introduction •Section 1. Hands-On Demonstration When you are ready to begin click: “Section 2: Applied Learning.” Complete Parts 1, 2, and 3. Make sure to obtain the required screenshots that are that are requested in the lab instructions and rubric. As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document: Provide a 200-word overview of the lab. Step 2: Answer the following questions in the lab document as part of the lab submission. Respond with a minimum of 100 words per question. 1.What is the difference between running a Sam Spade investigation versus searching DNS records? 2.Which method might let the target organization know you are looking at them? 3.What will the result of the search in Google® tell you? “site:amazon -site:www.amazon.com” As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document: Outline one other method that might let the target organization know they are being scanned at and explains. Review the rubric before beginning this activity.

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven