Using a fictitious organization and the vulnerability assessment tool “Nmap” perform a mock vulnerability assessment against one target server in the environment, and report the findings. The information should include:
A descriiption of the tool (Nmap) used to perform the scan.
A list of identified hosts (Obfuscate any specific/fake IP addresses).
The list of serious (on a scale of 1-5 (1 being the highest) report the 1 and 2 issues)
Describe or list any false positive information.
Discuss potential safeguards and remediation actions that could be implemented for each finding to reduce the risk.