Package deal
BUNDLED WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY
BUNDLED WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY
[Show more]BUNDLED WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY
[Show more]A.	Describe the network topology that you found when running Nmap. 
 
6 hosts were found using nmap -sn 10.168.27.0/24. The hosts are in a STAR topology as shown in the screenshot below. A star topology means that all hosts are connected to a central device, usually a switch. This makes it easier to...
Preview 2 out of 6 pages
Add to cartA.	Describe the network topology that you found when running Nmap. 
 
6 hosts were found using nmap -sn 10.168.27.0/24. The hosts are in a STAR topology as shown in the screenshot below. A star topology means that all hosts are connected to a central device, usually a switch. This makes it easier to...
TASK 1: NMAP AND WIRESHARK 
 
 
 
 
 
 
 
 
 
 
 
GRP1 TASK 1: NMAP AND WIRESHARK 
Emerging Technologies in Cybersecurity-C844 Western Governors University 
Jennifer Goodchild Student ID # # December 29, 2021 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1 
 
 
 
TASK 1: NMAP AND WIRESHARK 
 
...
Preview 2 out of 11 pages
Add to cartTASK 1: NMAP AND WIRESHARK 
 
 
 
 
 
 
 
 
 
 
 
GRP1 TASK 1: NMAP AND WIRESHARK 
Emerging Technologies in Cybersecurity-C844 Western Governors University 
Jennifer Goodchild Student ID # # December 29, 2021 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1 
 
 
 
TASK 1: NMAP AND WIRESHARK 
 
...
WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY 
Performance Assessment GRP-1 Task 2 
 
 
 
 
 
Table of Contents 
A.	Wireless Local Area Network (WLAN) Vulnerabilities.	2 
B.	Mobile Device Vulnerabilities.	2 
C.	Steps for Mitigation.	3 
D.	Preventative Measures.	4 
E.	Recommended Solution for Brin...
Preview 2 out of 9 pages
Add to cartWGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY 
Performance Assessment GRP-1 Task 2 
 
 
 
 
 
Table of Contents 
A.	Wireless Local Area Network (WLAN) Vulnerabilities.	2 
B.	Mobile Device Vulnerabilities.	2 
C.	Steps for Mitigation.	3 
D.	Preventative Measures.	4 
E.	Recommended Solution for Brin...
C844 grp1 task 1 nmap and wireshark 
 
 
August Voytek - C844 
 
A.	Describe the network topology… 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Figure 1 
NMAP scan indicates that there are a total of 8 devices on the 192.168.27.0/24 network. Three devices are Windows-based systems, three...
Preview 2 out of 11 pages
Add to cartC844 grp1 task 1 nmap and wireshark 
 
 
August Voytek - C844 
 
A.	Describe the network topology… 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Figure 1 
NMAP scan indicates that there are a total of 8 devices on the 192.168.27.0/24 network. Three devices are Windows-based systems, three...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller LIXAN. Stuvia facilitates payment to the seller.
No, you only buy these notes for $18.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
83637 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now