Report Structure
Introduction
1. What was the purpose of TigerVNC?
2. What was the purpose of Kali Linux?
3. What did the following command do when typed in Kali Linux’s
terminal window?
4. What did the following command do when typed in Kali Linux’s
terminal window?
5. What was the difference between nmap and zenmap?
6. What is accomplished by network footprinting?
7. What are the countermeasures a network security architect can set in
motion to diminish the threat from network footprinting?
8. What is the difference between network footprinting and network
reconnaissance?
9. In the context of network security, explain what is meant by after
reconnaissance comes penetration.
10. What is a denial of service (DOS) attack?
Conclusion
Reference
Related Products
Tags: MIS 589 Week 6 iLab Report, MIS589 Week6 iLab Report.
Message
All members who signed up before 2023 are requested to register again.